0000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xec1}, 0x28) 03:54:59 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x34000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:54:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xcba}, 0x28) 03:54:59 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xff3f]}}]}, 0x80}}, 0x0) 03:54:59 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000000)='nodevvmnet0self%keyring+\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs(r1, &(0x7f0000000080)='net/ptype\x00') sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:54:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000]}}, 0x1c) close(r1) 03:54:59 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x128a}, 0x28) 03:54:59 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x100000000000000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:54:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x147f}, 0x28) 03:54:59 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x5]}}]}, 0x80}}, 0x0) 03:54:59 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x1000000000, 0x10}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x4, 0x2002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0xc5fa, @remote, 0x5}, {0xa, 0x4e22, 0x9, @loopback, 0x7}, r3, 0x7}}, 0x48) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:54:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}}, 0x1c) close(r1) 03:54:59 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x14cc}, 0x28) 03:54:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa0a}, 0x28) 03:54:59 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0xa0010000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:54:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803]}}, 0x1c) close(r1) 03:54:59 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xffffffff00000000]}}]}, 0x80}}, 0x0) 03:54:59 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x39a) connect(r0, &(0x7f0000000000)=@in, 0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fcd7"]) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000400), 0x100000000000000c) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000dc0)=""/52, 0x34}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x22, &(0x7f0000006340)) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000200)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) getgroups(0x0, &(0x7f0000000240)) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhci\x00', 0x400200, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') ioctl$UI_SET_PHYS(r4, 0x4008556c, &(0x7f0000000240)='syz0\x00') getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x817, 0x9}, &(0x7f0000000640)=0x18) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000680)={r5, 0x1}, &(0x7f00000006c0)=0x8) setresgid(0x0, 0x0, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000005c0)={0x0, 0x5b, "b338f2dc627e08f59ac875176ec5e20dbb80a8c532a7070a63b5e943dded97d5b0151883da14a102abcddd86d3408d7e1864bd6b11fb16295c2c4642abff1ec7dba31e7b1b85777f32f092fed45765c7e3b58d501e65a09fbcb7d5"}, &(0x7f00000003c0)=0x63) ioctl$KVM_RUN(r3, 0xae80, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:54:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x529}, 0x28) 03:54:59 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xae6}, 0x28) [ 1866.505314] *** Guest State *** 03:55:00 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0xf000000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:00 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x1000000]}}]}, 0x80}}, 0x0) [ 1866.526220] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 03:55:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x10ae}, 0x28) 03:55:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x6e1}, 0x28) [ 1866.585766] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 1866.606196] CR3 = 0x0000000000000000 [ 1866.612772] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 1866.622034] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 1866.637416] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 1866.652010] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 1866.663513] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 1866.674281] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 1866.683517] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 03:55:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xc33}, 0x28) 03:55:00 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0xffffff7f, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1866.717775] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 03:55:00 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x3fff]}}]}, 0x80}}, 0x0) [ 1866.767560] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 1866.801704] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 1866.817288] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 1866.830003] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 1866.844678] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 1866.854987] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 1866.863581] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 1866.871617] Interruptibility = 00000000 ActivityState = 00000000 [ 1866.880794] *** Host State *** [ 1866.884548] RIP = 0xffffffff811fa704 RSP = 0xffff880188b67390 [ 1866.891654] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 1866.899112] FSBase=00007ff2bf88f700 GSBase=ffff8801daf00000 TRBase=fffffe0000033000 [ 1866.907214] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 1866.913830] CR0=0000000080050033 CR3=00000001bc4db000 CR4=00000000001426e0 [ 1866.934664] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87c01360 [ 1866.943201] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 1866.950281] *** Control State *** [ 1866.954296] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 1866.961612] EntryControls=0000d1ff ExitControls=002fefff [ 1866.968479] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 1866.975769] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 1866.983058] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 1866.990210] reason=80000021 qualification=0000000000000000 [ 1866.996581] IDTVectoring: info=00000000 errcode=00000000 [ 1867.002375] TSC Offset = 0xfffffc1656c3033a [ 1867.006865] EPT pointer = 0x00000001d82f001e 03:55:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}, 0x1c) close(r1) 03:55:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x11a8}, 0x28) 03:55:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xf8d}, 0x28) 03:55:00 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x2000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:00 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x3f00000000000000]}}]}, 0x80}}, 0x0) 03:55:00 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x0, 0x0, 0x0, {0xa, 0x4e23, 0x6, @mcast2, 0x2}}}, 0x3e8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@remote, @broadcast, 0x0, 0x3, [@empty, @remote, @multicast2]}, 0x1c) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='ocfs2_dlmfs\x00', 0x10000, &(0x7f0000000100)=':0x0}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/195, 0xc3}, {&(0x7f0000000380)=""/198, 0xc6}], 0x2, &(0x7f0000000480)=""/222, 0xde, 0x6}, 0x10000) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000100)={@empty, r1}, 0x14) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xe5d}, 0x28) 03:55:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xced}, 0x28) 03:55:00 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x2, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:00 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x500000000000000]}}]}, 0x80}}, 0x0) 03:55:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x218]}}, 0x1c) close(r1) 03:55:01 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x118}, 0x1, 0x0, 0x0, 0x4080}, 0x800) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1404}, 0x28) 03:55:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa6c}, 0x28) 03:55:01 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xf00]}}]}, 0x80}}, 0x0) 03:55:01 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x500000000000000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:01 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x280000, 0x0) recvfrom(r1, &(0x7f0000000240)=""/48, 0x30, 0x0, &(0x7f0000000280)=@l2={0x1f, 0x7, {0xffffffff, 0x7, 0x10001, 0x1f, 0x0, 0x8000}, 0x4, 0x7}, 0x80) syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x80000000, 0x40000) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f00000001c0)={0x1f, 0xdc, &(0x7f0000000040)="3063495468c426dc06166b4702fee044ffd5cbcc6ffd19ed75707d5d5147f255e3afd8775401c3d3349e7cdffa1af6b85295bae76f47a291727f829b6cf420dad23d58361f0dc78ade5e49ee94c71ea8daddb7e995439eef2db3aae182c1129cf8bb0d8d177909b123f3bd9289a75afd7a7f4228ae085e445d04fca10a5f4f34aaf88942a3e396d2b5a8ad205986db112dc7ca241e3e882c33307fd68a321afc3d271cb18c9a4bc363634b44e44e1cabbe042fa2be1a826974f74b218a95a3a191609cd302b8249ab85bff685c004afafcf4c42c3ed73f70cf67692f"}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) 03:55:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xf1a}, 0x28) 03:55:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x6fa}, 0x28) 03:55:01 executing program 5: r0 = dup(0xffffffffffffff9c) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x27, 0x4, @tid=r1}) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r2, &(0x7f0000000140)=@in, 0x80) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000380)="0c8c63ecc32345671cc9834ea6e14f050095a457133f117732fc38e8ecfa8908552eec853177d1b713d8780b34bd593b25046f832a5a9bd0fb991f9e84fe645e0671f95a44cf0624559a008cff242f186cdf65122f18532b8bb1ba3fdd8a83101b75f97a1c3c23241f55f8665e607f4ce20764028e5275686873ec4ba21d54a48e1530f6da87397b1c914c7ee0eb8f3c053846b4527c5861583bf09bb9290201443e5e8065855af2a6bb627eba50cb93d13707ee36892e090a772362fb34672a6e04f24623325aba9d86993aa9fc3c962fdb4e856486e88b3f4f44cbfccef1e2cf9fb5f86f208f10b7b614369f2827ac0b95e01338e15b70921a402ba9d1a0dfb54587162ba7bd6f5dd984d1afca6b3690d0b240f3d98e8c6a1baac74d7cad1c75feae91cc84bc6fc97aee8ecc9cd2005c57f2bfbad0f3b1b12ece315dc97740aa6ca601f5aadd373df0b9fa70c1569a7d14388439a219f4b81db9a966dddc18aeb07e543fe2c335ae4dc3563798971027957fab9e0ff9b5adc7aff6e1dea3a7faea66a95f924e1673c8c320f59aa7964772ac02ab82355ad5a36d5daca8b5b45a44c173e883fc2fec8a56edd8e146b38ddf8a21e3c9d09fd7f4d70d3dbe806e51ebba70622ed550949f1bc4f35bd03b2c26288dff7e32c3179dd193379dc069d4071abf54ccef1804e24bf2e704a6370390ad99953d443c7cb19cd9a395c2d7f4d6bede07d28e8cf6bf69f53c9b7013900640e5cfe8f9b9ecec331d751cd14fb62049789add128209ccce709a7e97da936158c928120f38f4469cd2d065e6095a30792e1a05cb6e5fef338f9d01050e617dc10567cf4c78483270201c52e96327e101fca77e0936be3c6b608ab6e2ddad52079193515af531e735af50c0a0ec3f131ab1226fc70d8e26d2e3b43a19c8ab696d9104fb6349af9367471e5af9ae0741ccf1d2b2a78af5d52f6c82dbc02294c057f08c3baf87e0a6c933775bf16129865aa75d06eeeff4d05b366ebc0a6276b6ee48c2d8973ec480eabde248005f505d1c021539fa4f55631cb27ec6d9c6a21bbb6d3cac2e4753f57e051ce906eb766210131fef2feaf8de30572a6e29930ffcc5f56836db99031a21642aa3c6de17834d631729a296408527dc19b2b2012b05a5aeff826851d14e97ca3e8b60677a485ac8eab822c7ee097c3cfaf712f29e3a44b10f75765e89a01bdc613de1bb53e893edac253eaa52cc0320ea88897a33d922f4d5360a73516804b9dd37d358db5ce4d31650c024702075024c23c1fd4331d3d4811620783b5d5830ad2b7bc435526a633be132a039698dd70875f477c340c60593eca760a7af7e96495ff46ed2121497d34f715dd5a3fc01cb0e6b19f7a832f8b756bc9bb7a4c63c141163054cdc5f4edb10ef0a0787a1e05889de47d1fd60c8844a93cff2c2c1c85a347b340a638ea4f139dc1ad2a9e256e7629c93ca0183f4ddef8e06dfcfeb6e16aadc7a7fc96c28233d8670391edf15c0fadff3053f114de24aedba3411185e7ad91b860846c5f97bee9b6c341d407ecfe5c364f828e2ef052ef49e798be31fd2bccf07c85d194b849e026d1ef2955778d15072c194cd63d5a6de2a9785ea793cbcd83f9a7c52bcd1e8b913401fd89e38751266ba34250ce62588b56a0df24667332d1b2ebd60eeda4d8580686eedf532b33adc41f657d23288597ad2a989aa2af2d81b59c43c6e839d22659c130f084d2c3ca2c1d9a4a8e82d45a2450b534dc16cfbaa2d125954687e644ac289887a772dda0f6eba6d63493f5a9e9d6ecec03a5137e6899dee327a2bd588a4212e43a31b570ff462541be0a0c0bcc19cdc59b2d8c4c51a24a8e0facbdf83d63a05592a200d52306d112f00ba7c4af024dbc15dc05a2f5122422786dc99421d50c3972553a0bea1c4b301a6a936ee61b3235d68d5d03ac6093b01df3519ed7da9e20d8dfb50de038e528181603805874057bffb3fb067f60ff7e58c783c1fb0be61042beebd03453f2a513f3a3a8b61d7ea162999dc8caf14fc10c508ec77bee649ed3e7925cb56736f706350ac0e20844b4e32136e8ec4d5e304f77132ab47d6c97432b36c0cf57bb912a48d1174cda0cded40208417fea5adbbf9a951b6c3bb0d9f71836a3fdc01e7db6b89f79fa81aba35a6f3f10f62d91da9457ce093082b45d7352fc9fa274fa3811e218b7d3823b878a39889292209f9276b51fe9660be9da8681ef2bb6e4c1c6037b76796279d771a6b8e26592f90bbed40f0c583d29104334b3c082b2db1eac77119ab8b04de191ecca088aa223068a43b83c40998440a0abf04689a3b49fd19f16e3bf9bc6917f8b86a75cfa770b675bf08d07123665517bada32b5a7085cd92f7a327131c91ddbde4775c5490a39a540daa66fa8a256b9fcecfdd4b49104013fbaa76502a2061caa0d80ee286fbef30f65beca01b6dcc320828530229238b9abd69bc930324f06300af3068848388bfa5ea15194a53e056252863f4b24b293e0815fbbc3b50174d29e9f99fd3cefc229f009600e960fece9e1d03306b9ab50319ef7b23d92d570c90e4b22bf63bd271f41862890482b05a4df3a4b03c7b2e254b0f443a1b40b5f1563c920cec8a184de9b012920af18ef48459e94139df4052c9a8e63f1a0523f85822391c91ce365f247a250ad3322bc3923b07c0d764c4845fb3f86a5759dbce384ca83bfe42af8e5d0f11233c2c24219c6bda63cb99fb7303b53c095ff28b3d7140a84d7ea2fe3b5c9bc50c1f460422f7e051789fd0cdf4f77c90822ccffbf8fcc27c4ddf093e43659a7240fe5b09417faeb847c7bf14053476b450b5876d802d0ea7b401977c532e8f54c8791377bf5ed0e3946b39978c534e902297ebc689e3fdf35544734779ccdf91ea20da33feef86af50c6cac5313d5ff2ae459e441ff576f9508eabea3c163493f8907060824361b409e787661b530b554c85e356c2529f638f0b182ab8ba666b7ffae537de280a3a521b5a30c0ed53aaa43dae5bfe23a55006e314639820c2e978e3777886e4e7d4ae06d9e02867ec4da7365abc555c24cd285069db79a4391a044431e05dad64038cfdb4461af4c6719b0abdd2ed13f1fec37f8a6dfa7f6bf25529a3373f0df403835c2b1a0fd6055c12fda132ce3b7292748f2a247621480624d2cd6bfc3f867620edb0a84527252638d27de68fe8dc993f433f0b04923b98fac617030b2358592839cf3a73f65592615a56d15c26ab258437f59da526ca392a57f38b9559c1393c7584973314333fcc0a9294d4d6fe69365cb60bbb9d1a001e0c01c04c48587922740a469795d2d7a72d80d3613183da388d60370c0568149fa076398bfac68425da344632deb622a6d0023261b821aa0e21177ccfd1735494053c7cea0b36d5bba1a8278d779bf6c2a64a74196b9713dae9d94bd440da755229f6a50a58f0d509a37e8f2678e87335450a23469a4f60e00706022fcb17688c9c89a25746fd433892bfed37a3659b0c6a4d9b8f613700a541927a3e89fb002f452974c4f9333369e943ae743a29a26d7eae8ba438e7b264638d3ef55448585265069f82fbb34064c94eb21ec9ce44f8ed4144745bdb95d7cb380a870fcb61b1b76e79c94c8823c55505fa8521c74c55ea43ec7857c60f1845a3c80ccd86843e1703d414738f3630e560cb3032416ab5a57991fd5af01c7ac9f05d7516eaab50ca953032421518357224ec9a5a959aac8b67001d79ee2bd8a921ae131260905371040111f8677260c8f648ba2fd411aa22594c7251048764578bd44dc21b94974306ccc78b2fa10b524ff49edfa6270b3580b90799cc8fe011ce37499ce4686e1a8cd85b40c4918c4a47c6ef8375bba63ae887d5fc96f4365d06480e0a9cee7e83d2d4807745d5177f21cae22ac7a2468a018ec0f9c66b93d3b4bd42bd542de69f5f0c39083c64a028a9a823cbd5e3530037f3a384ea86bfff3749317abc237e9c148042786f5ef1f2d547d09c5bde5f62ea3cb54bdf0ca2ef898c2bcd37ec1f2356402bfedde6fcc8edf8ff31f3cf56ac0d93bcf11cbe797ff0755d7bcb4c30cca874c555a4285649f46453caa94bf5a79be166ed7799503b0fda135483cfe2a006fc59eeb32a916d3064c246422caae605d8d800519ddf26c4b1e5c43fe22dbbf2a594cada36fb6eae236a2099c2b21826780e4b65583e7b995bf9f6f435c7716f1ca3ce2de25a14680105ffbf9b38604cfe907ceac2c2a3c717a862e809c0d2a7d2930cd25295de8483cfaa015f84b907fc40179b10cee0caf60bcca029dc3d3f0bd7c1ded00f1262eb363b208972f0c295a688691c7bb63ad9633b24527fecb29f3aa0c823296fdc7eeca705c88dcc37a3f1798904a0846d13c1dbac7b2388e7af25f88f48e5e69e0db6457f956acdaefa7913a1325a7a07e34d478a46346d4b808f70318187b8220f4f2bc0b42982111cd090eb7be38e448b641f3c6b036421653def013cfe6625950beaa0e9aa269c8f542feddb6045254d3248da7043beba2a5c674692734fe204e4373ee587974deff084e744f0ebcc134a44cbfa8d475858ca1363aada636823a69f81a0c13e818c8691ea068b8bc27b136690130c3c716ee6f7ff5b9bb8fc71377c84823c1a2f1a33978436ba21a2c255db3e98929b85cf876fc896630ed559d5a1e3ab5f6ce636a59441bee1dd49ac781a938ea3ffc92de66b29f566b37d2a5ce8f6ca8d6874889bd194fe802fb7ea797985744c6090b81b375e9083c24f5f4e897de3052507b8a8fc54131caa93d0bb1a735624b9d9e7f2b578516b04122baf132aed566c50ff0579f6f170bf01638a0b4f3f504e0253953fffdd7ec8c61527bfed9bcded90d6a11cfba41c87e2415233c6b00d0076c87e2216ea945e3e247f2618312c4142771b6925c00273c54f80bf736fb2201c034594bd3d9ef5401fedf390c1922938cf3631acc3d5da4d8b882a5f7450c82adb6b49bc8b63cbe084c155934af91215497f4895de72606ad235675eb24e2ebfb3e50dce8fa558450ce2efade0b0b913841aecb807020c5adf50c9e7ab2cce799a04c386abd359de5fac37b5cbfef0ee699ad13dec992dcb259d44e2c79d353b07956e243acd04b377848ad91a3d445cd0dfa6482d814ec85b1beea35a203420df7a77cc63358f85ca0beb93e646e75f70606bc1f40795dd8566d3759aca190b9b9fddad10515d2dee0a8fd3ccfb87e203dd2e449061dbec87f0c43b1114a59cc6cf2055d18aaa85a896c1c9218dbbfaefdc2f6461549c417b6bf97c4c9e67c1d1f74cfaad883473046b4173ace1d34cfca4211090bbe370b43f1a5e9425c39e66be376eab29fb6f49662914099aed578efb59152cc0991912dd9bd5d6f9b33c61b0b5db091e64755f09645ce6599c1ea048cc52cf7b716b8f51beda3b381911dda77e87927a7a3ff16ee27aa8d9ae5b003beeca122795d4e1c64c4ab208605fd5519a3cd995859f029211d71ed1bc5f6e9f29a4ee5c7fc70952b3237ba5c313e430a83cbb3c66a8ae0cff8a02c7067ac663bc36be308f2c0de4af6a47e6100545eb8a5138b784c03a6e6d9e02f34ea1977d34dc2d401937a7679004202d8c3ffd3b3bced862b13b2b117eb730361c5e35c32343728c2e8b40b31a27fdeb67a3fd955480cf7576c7e09e86e6d2b8ff66d75bfe3e7b5c8997fd1faa70c3eaf436e23c940e8f6981f8a8642cb61c81b69a4f83a9eb8b230c4cc18d3cd9110a01b5d5b10233b98afebd8838e5dd02184c3a57dad675dd7", 0x1000, 0xfffffffffffffffc) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r3, r4) sendto$inet6(r2, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:01 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x40030000000000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:01 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x3f00]}}]}, 0x80}}, 0x0) 03:55:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}, 0x1c) close(r1) 03:55:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xfea}, 0x28) 03:55:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x128b}, 0x28) 03:55:01 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2000, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x67, &(0x7f00000001c0)=""/121, &(0x7f0000000240)=0xffffff9b) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x3, 0x9, 0x0, 0xaf8}, {0x6, 0x3, 0x8, 0x1e9de9a4}, {0xffffffffffffff18, 0x8, 0x2, 0x8}, {0x4, 0x7, 0x10000, 0x7}, {0x9, 0x2, 0x1, 0x7}, {0x7, 0x0, 0x4, 0xbb9a}]}, 0x10) setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r1, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r1, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) clock_getres(0x6, &(0x7f0000000280)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40000, 0x0) 03:55:01 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xffffffffa0008000]}}]}, 0x80}}, 0x0) 03:55:01 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x2000000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:01 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x1000000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xae3}, 0x28) 03:55:01 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x34000]}}]}, 0x80}}, 0x0) 03:55:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x13}, 0x28) 03:55:01 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f0000002b80)=[{{&(0x7f0000000400)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000480)=""/113, 0x71}], 0x1, &(0x7f0000000540)=""/210, 0xd2, 0x1}, 0xa6}, {{&(0x7f0000000640)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000a80)=[{&(0x7f00000006c0)}, {&(0x7f0000000700)=""/144, 0x90}, {&(0x7f00000007c0)=""/210, 0xd2}, {&(0x7f00000008c0)=""/35, 0x23}, {&(0x7f0000000900)=""/141, 0x8d}, {&(0x7f00000009c0)=""/192, 0xc0}], 0x6, &(0x7f0000000b00)=""/233, 0xe9, 0x5f}, 0x5}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000c00)=""/230, 0xe6}, {&(0x7f0000000d00)=""/250, 0xfa}, {&(0x7f0000000e00)=""/10, 0xa}], 0x3, &(0x7f0000000e80)=""/199, 0xc7, 0x80000000}, 0x1}, {{&(0x7f0000000f80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/205, 0xcd}], 0x1, &(0x7f0000001140)=""/252, 0xfc, 0x77fafe8d}, 0x10000}, {{&(0x7f0000001240)=@nfc, 0x80, &(0x7f0000002a00)=[{&(0x7f00000012c0)=""/106, 0x6a}, {&(0x7f0000001340)=""/254, 0xfe}, {&(0x7f0000001440)=""/214, 0xd6}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/130, 0x82}, {&(0x7f0000002600)=""/211, 0xd3}, {&(0x7f0000002700)=""/238, 0xee}, {&(0x7f0000002800)=""/169, 0xa9}, {&(0x7f00000028c0)=""/235, 0xeb}, {&(0x7f00000029c0)=""/1, 0x1}], 0xa, &(0x7f0000002ac0)=""/169, 0xa9, 0x5}, 0x100000001}], 0x5, 0x2000, &(0x7f0000002cc0)={0x77359400}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000002d00)={0x0, @in6={{0xa, 0x4e20, 0x3ff, @ipv4={[], [], @broadcast}, 0x9}}, 0x5, 0x3}, &(0x7f0000002dc0)=0x90) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000002e00)={r1, 0x8, 0x30, 0x1f}, &(0x7f0000002e40)=0x18) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0xe8000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000000040)=',usercgroup@bdev/\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000100)={0x7, 0x1000, r3, 0x6, r4, 0xfff, 0x8, 0x7f}) r5 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r5, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r5, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}, 0x1c) close(r1) 03:55:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x70d}, 0x28) 03:55:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x2cd}, 0x28) 03:55:02 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x400300, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:02 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x38, &(0x7f00000001c0)="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", 0x2e7) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x6000, 0x0) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/91, 0x5b}, &(0x7f00000000c0), 0x1}, 0x20) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:02 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x100000000000000]}}]}, 0x80}}, 0x0) 03:55:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}, 0x1c) close(r1) 03:55:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xe68}, 0x28) 03:55:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xd54}, 0x28) 03:55:02 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000000)={0x0, @broadcast, @rand_addr}, &(0x7f0000000040)=0xc) fsetxattr$security_smack_transmute(r0, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x1) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x80800, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000001c0)={r0}) bind$can_raw(r2, &(0x7f0000000200)={0x1d, r1}, 0xfffffffffffffd84) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:02 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x4, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:02 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xf000000]}}]}, 0x80}}, 0x0) 03:55:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x116a}, 0x28) 03:55:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xc8}, 0x28) 03:55:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50000]}}, 0x1c) close(r1) 03:55:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xcc7}, 0x28) 03:55:02 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) r1 = gettid() r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000080)='posix_acl_access\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r1, r2, 0x0, 0x1, &(0x7f0000000040)='\x00', r3}, 0x30) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:02 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x1a0]}}]}, 0x80}}, 0x0) 03:55:02 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0xffffffffa0010000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x97f}, 0x28) 03:55:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xc0c}, 0x28) 03:55:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000]}}, 0x1c) close(r1) 03:55:02 executing program 5: r0 = socket$inet6(0xa, 0x200806, 0x1) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x7) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6, 0x4e22, 0x7, 0x4e23, 0x2, 0x2, 0xa0, 0x20, 0x11, r1, r2}, {0x9, 0x146, 0x9, 0x4, 0x80000000, 0x1, 0x1, 0x82df}, {0x1000, 0x87, 0x377, 0x3}, 0xfffffffffffff001, 0x6e6bc0, 0x1, 0x1, 0x3, 0x3}, {{@in=@loopback, 0x4d2, 0x32}, 0xa, @in6=@remote, 0x34ff, 0x3, 0x3, 0x8, 0x200, 0x3, 0x9}}, 0xe8) r3 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x6, 0x1) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000580)=""/102) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x5c9}, 0x28) [ 1869.332967] net_ratelimit: 16 callbacks suppressed [ 1869.332979] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:02 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x200000000000000]}}]}, 0x80}}, 0x0) 03:55:02 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x1a0ffffffff, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}, 0x1c) close(r1) 03:55:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xff6}, 0x28) 03:55:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xb32}, 0x28) 03:55:03 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x0) socket$inet6(0xa, 0x3, 0x80) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) [ 1869.583039] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:03 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x110}, 0x28) 03:55:03 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0xf00000000000000]}}]}, 0x80}}, 0x0) 03:55:03 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0xa0008000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x2d2}, 0x28) 03:55:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}, 0x1c) close(r1) 03:55:03 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xc07}, 0x28) 03:55:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x479}, 0x28) 03:55:03 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x20000000]}}]}, 0x80}}, 0x0) 03:55:03 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0xffffffef, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1869.871391] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:03 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xe94}, 0x28) 03:55:03 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x1) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@loopback, @ipv4, @mcast2, 0x4, 0x3ff, 0xffffffff, 0x500, 0xfff, 0x40040, r1}) 03:55:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xdc6}, 0x28) 03:55:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x91ffffff00000000]}}, 0x1c) close(r1) 03:55:03 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1240}, 0x28) 03:55:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x910}, 0x28) [ 1870.122147] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:03 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x8000a0ffffffff, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:03 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x1000000]}}]}, 0x80}}, 0x0) 03:55:03 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x2a7}, 0x28) 03:55:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000]}}, 0x1c) close(r1) 03:55:03 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x27e}, 0x28) [ 1870.353364] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:03 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000000c0)={0x0, 0xad, &(0x7f00000001c0)="891550172f951e1576328cde66b166dc6c66249ff273b00381c285562d8d9cbd17ddd377bd5c8195442925e6fa38cfe3e1ef4b7e705ea446be23e3b13d863f71abe59a40a1452115dbd755bc00bf437b4ae601b4c014db88d41c9ca7aed103cc9ab90cd44979faad2572b7900b237d235e4107b6f15b98e3dc9fe7b90233ef334ed7b3cb0e1d940753d383405016eb79459a2bd23de260bde2e5893a5e343cdbc5038124d51af63494c34da270"}) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x40000000000, 0x1) r3 = fcntl$getown(r0, 0x9) ptrace$getregs(0xe, r3, 0x0, &(0x7f0000000280)=""/72) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000040)=0x4, 0x4) 03:55:03 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x3f00000000000000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:03 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0xf000000]}}]}, 0x80}}, 0x0) 03:55:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x546}, 0x28) [ 1870.435037] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:03 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x7a4}, 0x28) 03:55:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000]}}, 0x1c) close(r1) 03:55:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xc0b}, 0x28) [ 1870.616750] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x256}, 0x28) 03:55:04 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) r1 = getpgid(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/uts\x00') sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x100, 0x0) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000040)={0x10000, 0x9}) 03:55:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x2000]}}]}, 0x80}}, 0x0) 03:55:04 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x3f000000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1870.687162] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:04 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8802]}}, 0x1c) close(r1) 03:55:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xc5a}, 0x28) 03:55:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x2ef}, 0x28) 03:55:04 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0xf00]}}]}, 0x80}}, 0x0) 03:55:04 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x20000000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x445}, 0x28) 03:55:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xbf7}, 0x28) 03:55:04 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x3ff, 0x9eea, 0x5ebd}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x9, 0x946}, &(0x7f0000000100)=0x8) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x862}, 0x28) 03:55:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x459}, 0x28) 03:55:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x4]}}]}, 0x80}}, 0x0) 03:55:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8004]}}, 0x1c) close(r1) 03:55:05 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = dup3(r0, r0, 0x80000) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000000)={{0x80000000, 0x7f, 0x87a, 0x1, 0x5, 0x800}, 0x4}) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:05 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x1a0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x738}, 0x28) 03:55:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa3c}, 0x28) 03:55:05 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x5000000]}}]}, 0x80}}, 0x0) 03:55:05 executing program 5: r0 = socket$inet6(0xa, 0x1000000000802, 0x7) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000), 0x4) 03:55:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xcf1}, 0x28) 03:55:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xb9b}, 0x28) 03:55:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x142c}, 0x28) 03:55:05 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0xffffffff00000000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:05 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0xff3f]}}]}, 0x80}}, 0x0) 03:55:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3075000000000000]}}, 0x1c) close(r1) 03:55:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x10bb}, 0x28) 03:55:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x210}, 0x28) 03:55:06 executing program 5: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f00000001c0)=""/187, &(0x7f0000000100)=0xbb) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r1, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r1, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000040)=""/91, &(0x7f00000000c0)=0x5b) 03:55:06 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x1a0ffffffff]}}]}, 0x80}}, 0x0) 03:55:06 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0xefffffff00000000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa00}, 0x28) 03:55:06 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x3b) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:06 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x200000000000000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:06 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0xa0008000]}}]}, 0x80}}, 0x0) [ 1872.671324] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x870}, 0x28) [ 1872.752533] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}, 0x1c) close(r1) 03:55:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x68}, 0x28) 03:55:06 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x7) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0xe) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_int(r2, 0x0, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) 03:55:06 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0xf00000000000000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:06 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x4000000]}}]}, 0x80}}, 0x0) 03:55:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xf62}, 0x28) 03:55:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x12e0}, 0x28) 03:55:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, 0x1c) close(r1) 03:55:06 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x500, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:06 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0xffffff7f]}}]}, 0x80}}, 0x0) 03:55:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xd1}, 0x28) 03:55:06 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000280)) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0xb8fe67cfc3b01f79) syz_mount_image$ceph(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)='./file0\x00', 0xf45, 0x2, &(0x7f00000000c0)=[{&(0x7f00000001c0)="c0455cfb24799c79c58bb58872300b370d01bcb7197025411626557c97cbb095faa455244ff45cf5f410ac4be73d3ba3be25d7f6b08fc1bc48c9728b3219a6b51593d4d45f20a58f64ebf5accbf850e83f2807880f0bbd87bf1492d340e35c355c8ccee9a595750680f03cf6e69e226af0901a0708f0996aa8328217e4af3fd4d2d838d4995fd36efa0ffae9056996313c32987977e7f1d691f6dce889bdab0decb95acc05d6601c08", 0xa9, 0x5}, {&(0x7f0000000380)="0e098d4ddef13915a906348d10ef4c5606915ef140fc562d9ebbea737649c9e276aece3a036c48a56b2fddd08a809b118332ddc99ff9104ab9c9c5b2eda334bd8452eee8474e515b03a3c0ef8819bb9fc0032165a3328b4c472443b5221d2c5c7af9c4f7a7351981f400d5c36ff1247a301bff30fedf780994e9233828f0fb5a461281779d18d7", 0x87, 0x3}], 0x2000, &(0x7f0000000100)='wlan1\x00') ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x3) 03:55:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}, 0x1c) close(r1) 03:55:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa}, 0x28) 03:55:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1502}, 0x28) 03:55:07 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x4000000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:07 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x3f00]}}]}, 0x80}}, 0x0) 03:55:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xfd1}, 0x28) 03:55:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0]}}, 0x1c) close(r1) 03:55:07 executing program 5: r0 = socket$inet6(0xa, 0x100000802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x32, &(0x7f0000000000)="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", 0x102) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:07 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x100000000000000]}}]}, 0x80}}, 0x0) 03:55:07 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x8000a0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x782}, 0x28) 03:55:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x2b6}, 0x28) 03:55:07 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x1000, 0x8100) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f00000000c0)) connect(r0, &(0x7f0000000000)=@un=@file={0x0, './file0\x00'}, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x31a}, 0x28) 03:55:07 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = shmget(0x2, 0x3000, 0x142, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000000)=""/209) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:07 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x8000a0]}}]}, 0x80}}, 0x0) 03:55:07 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0xf00, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa42}, 0x28) 03:55:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16000000]}}, 0x1c) close(r1) 03:55:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa33}, 0x28) 03:55:08 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x40040) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000080), &(0x7f00000000c0)=0xc) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000100)={0x1ff, 0x400, 0xea89, 0xffffffff80000001}) r2 = getpgid(0x0) write$P9_RGETLOCK(r1, &(0x7f0000000040)={0x1e, 0x37, 0x2, {0x2, 0x5, 0x3, r2}}, 0x1e) 03:55:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xb79}, 0x28) 03:55:08 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x400300]}}]}, 0x80}}, 0x0) 03:55:08 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x3f00, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xfbd}, 0x28) [ 1874.615536] net_ratelimit: 6 callbacks suppressed [ 1874.615550] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xeb8}, 0x28) [ 1874.680249] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:08 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0xffffffffa0008000]}}]}, 0x80}}, 0x0) 03:55:08 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x416) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) bind(r0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @multicast1}, 0x4, 0x2, 0x4}}, 0x80) getsockname(r0, &(0x7f0000000080)=@can={0x1d, 0x0}, &(0x7f0000000100)=0x80) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@bridge_getlink={0x2c, 0x12, 0x400, 0x70bd25, 0x25dfdbfd, {0x7, 0x0, 0x0, r1, 0x2, 0x1420}, [@IFLA_IFALIASn={0x4}, @IFLA_LINKMODE={0x8, 0x11, 0xffffffffffffff00}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x100, 0x0) write$P9_RRENAME(r2, &(0x7f00000003c0)={0x7, 0x15, 0x1}, 0x7) 03:55:08 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x5, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x1c) close(r1) 03:55:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x121}, 0x28) 03:55:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xe16}, 0x28) [ 1874.921896] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:08 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) r1 = getpid() sched_getscheduler(r1) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:08 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x3f00000000000000]}}]}, 0x80}}, 0x0) 03:55:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xd86}, 0x28) [ 1874.997596] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:08 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0xffffffffa0008000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, 0x1c) close(r1) 03:55:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1188}, 0x28) 03:55:08 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) getresgid(&(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200)=0x0) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x20000, &(0x7f0000000240)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@access_client='access=client'}, {@version_L='version=9p2000.L'}, {@cache_fscache='cache=fscache'}, {@dfltgid={'dfltgid', 0x3d, r1}}], [{@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) connect(r0, &(0x7f0000000140)=@in, 0x80) r2 = syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x6, 0x40000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f00000003c0)=""/96) getitimer(0x3, &(0x7f0000000000)) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x86b}, 0x28) 03:55:08 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x500000000000000]}}]}, 0x80}}, 0x0) 03:55:08 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x5, 0x9}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={r1, 0x889}, &(0x7f00000000c0)=0x8) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x12df}, 0x28) 03:55:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x4fd}, 0x28) 03:55:08 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x2000000000000000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:08 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0xffffffff00000000]}}]}, 0x80}}, 0x0) 03:55:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x7fe}, 0x28) 03:55:09 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000000)="fff4306946fe93a0e6000002000000000003000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6, @in=@remote, 0x4e20, 0x5, 0x4e20, 0x5, 0xa, 0x20, 0xa0, 0x0, 0x0, r1}, {0xfff, 0x67b3, 0x7c9b, 0x1f, 0x1ff, 0x80000001, 0x7fffffff, 0x1}, {0x1, 0x8001, 0x7, 0x4}, 0x9, 0x6e6bbb, 0x0, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x4d2, 0x2b}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x19}, 0x34ff, 0x0, 0x3, 0x2, 0x2, 0xf71, 0x97}}, 0xe8) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0008000]}}, 0x1c) close(r1) 03:55:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x56a}, 0x28) 03:55:09 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x400000000000000, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x6d8}, 0x28) 03:55:09 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x1a0]}}]}, 0x80}}, 0x0) 03:55:09 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x0, 0xa}, 0x10) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:09 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) getsockopt$inet_dccp_int(r2, 0x21, 0x10, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 03:55:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x115f}, 0x28) [ 1876.090454] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1390}, 0x28) 03:55:09 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x3f000000]}}]}, 0x80}}, 0x0) 03:55:09 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x2000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1876.184515] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdca4655]}}, 0x1c) close(r1) 03:55:09 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) socket(0x17, 0x0, 0x20) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) r3 = getegid() getpeername(r0, &(0x7f0000000580)=@vsock, &(0x7f0000000600)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0xc000, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8fce45022bf22fad}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3f}}, {@max_read={'max_read', 0x3d, 0xf446}}, {@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0xffffffffffffffff}}, {@max_read={'max_read', 0x3d, 0x3}}, {@default_permissions='default_permissions'}, {@blksize={'blksize'}}, {@max_read={'max_read', 0x3d, 0x8}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}], [{@dont_hash='dont_hash'}, {@obj_user={'obj_user', 0x3d, 'ppp1cpuset'}}, {@smackfsdef={'smackfsdef', 0x3d, 'vboxnet1'}}, {@fsname={'fsname', 0x3d, '(selinux'}}, {@uid_lt={'uid<', r4}}]}}) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xce5}, 0x28) 03:55:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xbdc}, 0x28) 03:55:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x4c2}, 0x28) 03:55:09 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x8000a0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:09 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x2]}}]}, 0x80}}, 0x0) 03:55:09 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xfffffffffffffffd) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000740)=0x6d) connect(r0, &(0x7f0000000140)=@in, 0x80) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x8000000500, 0x0) getpeername(r2, &(0x7f0000000380)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000002c0)=0x80) write$smack_current(r2, &(0x7f0000000200)='GPLmd5sum%*%\x00', 0xd) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000240)={r1, @remote, @dev={0xac, 0x14, 0x14, 0xc}}, 0xc) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000280)={0x1f000}) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) 03:55:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x10c9}, 0x28) 03:55:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xf8}, 0x28) 03:55:10 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x4100, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x8002, 0x2, 0xa622, 0x0}, &(0x7f0000000080)=0x10) r3 = shmget(0x0, 0x1000, 0x7c000a0f, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_STAT(r3, 0xd, &(0x7f00000001c0)=""/107) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r2, &(0x7f0000000100)=0x4) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:10 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x5]}}]}, 0x80}}, 0x0) 03:55:10 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}}, 0x1c) close(r1) 03:55:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x3fd}, 0x28) 03:55:10 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x500, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:10 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000000)=@ax25={0x3, {"6c603b5417a626"}, 0x7}, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1138}, 0x28) 03:55:10 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0xff3f000000000000]}}]}, 0x80}}, 0x0) 03:55:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x93}, 0x28) 03:55:10 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0xb60, 0x4}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000001c0)={r2, 0x9, 0x24, "e34ed68e3ad50d7e7a8dfabaff8dbee7545bdc1c1bb8d1be3df668df9afd0e5974eb0d30"}, 0x2c) ioctl$NBD_DISCONNECT(r1, 0xab08) connect(r0, &(0x7f0000000140)=@in, 0xfffffffffffffdbd) socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x13f5}, 0x28) 03:55:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x789}, 0x28) 03:55:10 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = socket$inet(0x2, 0x80001, 0x200) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000100)=[{0xb, 0x1}, {0x4, 0x5}, {0x4, 0x5}], 0x3) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) kexec_load(0x40, 0x5, &(0x7f0000000500)=[{&(0x7f0000000000)="f902ae58d9fc0523dd3a884ca66e7ee553d34406a1c12464368453d554b1cc1b421e55794731c3d0f7af0700db2285e8eeafb616596cc6ce4e03f841a694d0a82ca11fd503d6fa32c870bb95ea963e7fdfb52421b8e2c4586e8031cb9ea1481abf78c3e54e20674795512fe6a0abd72afb7dd23ab917383523e24332a9836186c68c3a23a757585b9fd10ed58f7f7f2784c49c0becf3f1688a9d74aede27ac353cdcb75661d5dd4dcc92ead26019bbe0402c2de339eb8511295967d1c0f52b2cb6b1227a38ad045142005a4473a753acdf20ab213a7e29baffd99487e15f20b3ab673ff8245a3964bd", 0xe9, 0x400, 0x3}, {&(0x7f00000001c0)="23080e3c89e245c01456962cd8ced481aefe1e5fd4d7df9c85d907bdd0ec2cb8d13490ae260f122123576df581bc6b5891c6e54cd364fedc8ecfd136b7d36b2570bcb0f1dffc56a563195807c3c3c0d66a97a4b346c376a03d5ea525143ab470", 0x60, 0x7, 0x3}, {&(0x7f0000000240)="cbd7c13a35b5c76a72c897d9e35d3badd00281112dfa627f138b96fcd2e8a718937b3fa6fa78f284804e3338cbf957dddad29eac2c428190552a55e6ae52e3bb68c5c98a8cd738b496d1b292ebd0f8a1ee8dda4bbed878da71f519d4e301314da16881fbe0122ce9", 0x68, 0x401}, {&(0x7f0000000380)="b6a160a00851f1a991197842e92b81aeaaa8949a6d8f379c3fece6aa21e8188bcde657094cb5f87a6e6e627bbdf356b47fbd2e6d95fd5d735c34ca62873af965fbb54965c9cfbd2e732fd1a842fc4b1b2ebb5973fdfd9d4cf631d6e8837c776ae650ae39a7af801995608e0f2c20b306227f1524dded2d3c97ab38feb5ee4e8cc27106bd5b2ad7c0893761537dee36ba949a6e11470651fc878b0aadd278835e99ec4cbe471d48a5ff9f59034a4ab3d4fdf21286", 0xb4, 0x3, 0x3}, {&(0x7f0000000440)="6cc8c6f67cc2f4c7097326f8fdb0d575a75f0bf24bea15eb252e3198df8a7dab4fe546b9e6627053db05907164d3dbfbb2066eca0a5795c4ab0dfdae1fdb22983315360e2caa180d85ff7a97c8380431aa0f55726e7598d170d115dd144dd61f7316354608484cb7e3d27cc89e0182bdf6d9997841dbadceb45baf9b8f5ff6dedbc6a916953f55f388a013e6ecdcc0e8fdb73eb5a4aa3d7610db524f7dca7c7a75d52e94edfbde5cbd00a298", 0xac, 0x8001, 0x9efa}], 0x1f0000) dup3(r1, r0, 0x80000) 03:55:10 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x8000a0ffffffff]}}]}, 0x80}}, 0x0) 03:55:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}, 0x1c) close(r1) 03:55:11 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0xf00, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1129}, 0x28) 03:55:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x10dc}, 0x28) 03:55:11 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="b36074e6e408f614858256a05467ad5326902a5e811c", 0x16, 0x20000000, 0x0, 0x0) 03:55:11 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x400000000000000]}}]}, 0x80}}, 0x0) 03:55:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xdc5}, 0x28) 03:55:11 executing program 5: r0 = socket$inet6(0xa, 0x802, 0xee) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000000)={@mcast1, 0x0}, &(0x7f0000000040)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000000080)={@loopback, r1}, 0x14) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) [ 1878.142734] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x68f}, 0x28) 03:55:11 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x40030000000000]}}]}, 0x80}}, 0x0) 03:55:11 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0xf000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1878.237735] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}, 0x1c) close(r1) 03:55:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1031}, 0x28) 03:55:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x182}, 0x28) 03:55:11 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0xffffff7f00000000]}}]}, 0x80}}, 0x0) [ 1878.439223] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:11 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) fcntl$setsig(r1, 0xa, 0x3d) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1387}, 0x28) 03:55:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x1c) close(r1) 03:55:12 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x3f00, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:12 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xe6d}, 0x28) 03:55:12 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0xa0010000]}}]}, 0x80}}, 0x0) 03:55:12 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001640)={0x0, 0x0, 0x0}, &(0x7f0000001680)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x7d, 0x7, &(0x7f0000001580)=[{&(0x7f0000000080)="7b9ca9e64cb9fef933a49826aef4a42a71b63281a12ae00951ff933c9f519d65960a765e91604cc7ef6cb2d4469aaa51693b", 0x32, 0x8}, {&(0x7f00000001c0)="d6c447984692bda61da52add0409e1a7b864d3b8e0cfa35f8e3803e002328abc92a3a6d2c2dfb0a7a4c7d4119308e1f66d88092ad56717f81e3cc86cc9fb6e1fdacc48fa4d577f643faf6744cfe924224d4e630e009fc6e0535070b7abbf9ab905e8270c96bc59d62183aaf53afe0aede5d71c16785126ec562dd5da043fdd8c907f1eeb95b3af817555ec6c08208928483c65b02d880eb63d184ed83d3174fe470439be62031f5c9ece95c72b25aa8eec2716dbca9d2de9cf212bf86147f8d884f4128655", 0xc5, 0x6}, {&(0x7f00000000c0)="e210c8c0415a6472114e34154e1872844e3bbbef0c3e106889a173dfcc65ce100121bfe517a9aad2dea791ee371d5d4a6d2035c5a6aa6878f1d72062448edce704b3a9019b0459359325ee7ba6c03e3fbeace093765d0dc2e9d617677db5a5f0949eb260cac45f", 0x67, 0x7fffffff}, {&(0x7f0000000380)="df1d78de814d59e4be102e7592af31faac73a3760dff16dd1ba77ff3b93531f4af0dba3847cc86833046999d552425818e602ebe4ab3cd198f01c975723462c488a4a921f152515956b1e62c536f78e2116a860f6779866f19fd6bd3de0c525c0dccd3ea3f98f5e82e69dcbeccf079c2bf213a6a13cd868f5fb76accafc45ebf26ac42bbb586dd743bae8033c5ac75956046786c04249fb04ab19deb5f459baa45bb73bf6c0c267c2cec86bdf2c282c8fd9a7c515ec0497fc33a3243c574b6d1215bf8b1edc7c92ff2417638826745a0119c95d465bd89276f8dbe288c9823169051decf1f05", 0xe6, 0x2}, {&(0x7f0000000480)="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", 0x1000, 0x9}, {&(0x7f0000001480)="7573c184bb68ee2c595f9bd610aa1f6011fb0c0d553146f753c45a05c8c865982865fa863ceadac0572e7edea0d357c3747453a794010e7bfea09d04850e5c8230fabb6d0451db0d4b4f48d5d98ca516dce3eba54c7d3af93aaed2fbfcdb7715aad239932ee1bbaca901ed8cf379a596d9272d4a78f96d7601fda3eba0323d2873a77e9f1c80b937fb5ed0a3d53a45cc2cd75e7661c7050bd55d672cb31b0b125081bed59c02ca9fed13d678b07b846b484afa133b84c2337acb6a709e58c14d2ccc56efe36621c331a33fd6e7e052145d57ccbb7c242ca1bcd0", 0xda, 0x8001}, {&(0x7f00000002c0)="95c7aebf734dad4879baabfb7b4114edbe34bf2406e20e72d261552c248ff5b80fe588a3b4f1451489fb00833198a2", 0x2f, 0x3}], 0x40000, &(0x7f00000016c0)=ANY=[@ANYBLOB='mft_zone_multipliOr=0x0000000000000001,errors=recover,nls=cp852,hash,uid<', @ANYRESDEC=r1, @ANYBLOB=',subj_type=,fsname=-#{$@,smackfsdef=,\x00']) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340), &(0x7f00000018c0)=0x4) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000001940)="ff0204000000020500000000000000000000000000000000", 0x2b6) lsetxattr$system_posix_acl(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)='system.posix_acl_default\x00', &(0x7f0000001800)={{}, {0x1, 0x7}, [{0x2, 0x0, r1}, {0x2, 0x6, r1}, {0x2, 0x4, r1}, {0x2, 0x5, r1}, {0x2, 0x3, r1}, {0x2, 0x5, r1}, {0x2, 0x1, r1}, {0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x0, r1}], {0x4, 0x5}, [{0x8, 0x3, r2}, {0x8, 0x4, r2}], {0x10, 0x5}, {0x20, 0x7}}, 0x84, 0x1) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1196}, 0x28) [ 1878.728967] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:12 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x5, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:12 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x5d5}, 0x28) 03:55:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240]}}, 0x1c) close(r1) 03:55:12 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x34000]}}]}, 0x80}}, 0x0) 03:55:12 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = geteuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@mcast1, @in=@broadcast, 0x4e21, 0x1, 0x4e20, 0x9, 0xa, 0x80, 0x20, 0xaf, 0x0, r1}, {0x0, 0xfff, 0x0, 0x0, 0x9, 0x3000000, 0x3, 0x2}, {0x10000, 0xffff, 0x200, 0x7ff}, 0x3, 0x6e6bbb, 0x0, 0x0, 0x0, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x1c}, 0x4d4, 0x3c}, 0xa, @in=@multicast1, 0x3503, 0x0, 0x3, 0x17, 0x0, 0x1, 0x3}}, 0xe8) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 03:55:12 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x1a0ffffffff, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1ae}, 0x28) 03:55:12 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1417}, 0x28) 03:55:12 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x200000, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000100)={0x3, 'bridge_slave_0\x00', 0x1}, 0x18) preadv(r1, &(0x7f0000000600)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f00000001c0)=""/228, 0xe4}, {&(0x7f0000000380)=""/146, 0x92}, {&(0x7f0000000080)=""/53, 0x35}, {&(0x7f0000000440)=""/237, 0xed}, {&(0x7f00000002c0)=""/41, 0x29}, {&(0x7f0000000540)=""/163, 0xa3}], 0x7, 0x0) 03:55:12 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x2000000]}}]}, 0x80}}, 0x0) 03:55:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x508}, 0x28) 03:55:12 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x800, 0x10000) ioctl$sock_bt(r1, 0x8907, &(0x7f00000000c0)) connect(r0, &(0x7f0000000000)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xfffffeaf, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:12 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x2000000000000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:12 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xb9a}, 0x28) 03:55:13 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}}, 0x1c) close(r1) 03:55:13 executing program 5: r0 = socket$inet6(0xa, 0x802, 0xfffffffffffffffd) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xce6}, 0x28) 03:55:13 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x2000000000000000]}}]}, 0x80}}, 0x0) 03:55:13 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x100e}, 0x28) 03:55:13 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x200000000000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:13 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) 03:55:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x183}, 0x28) 03:55:13 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x12cd}, 0x28) [ 1879.918433] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:13 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x4, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:13 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x500]}}]}, 0x80}}, 0x0) 03:55:13 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000040)=0x863) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:13 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}, 0x1c) close(r1) 03:55:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1212}, 0x28) 03:55:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x136}, 0x28) 03:55:13 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x11f8}, 0x28) 03:55:13 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0xa8000, 0x0) write$nbd(r0, &(0x7f0000000380)={0x67446698, 0x1, 0x1, 0x4, 0x1, "e34f5c00ce509c131c0a4e4e648cbc3d822f6085be7f19a197e71e3a27ebff88f06c3ac1c656cbf3778958457ea612efc6e60be7c1d736f9a73cc8164d8042379b273213b161723bbc3c9d8d4761b0f4652a6aa0d912e419fe7811e950d0dd7eb33b7b5c87201a545a56353a3b3d368ca6cfc02259200c62b051d72ea06c5d551deb6ccc4363d90d6519483d6108ab98f52dea55ece5526ffb651ea429201458be1cf91b15fd0210524a61c9f3db23460e9c0535679f1c8ce12adc94a68aec50148a3ceb496d59ac3cedba38ff402d00b29132617d7c3b7a5c70d09921805abb6695dc87390c8e8a1a2735d05d3a8f5e9574cd5c6a593701c2"}, 0x109) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20000, 0x0) sendto$inet6(r1, &(0x7f0000000040)="33a51315d904dd22004b34394d15854c6ae37279553b0f7eee9bd09c5cf0e38dc2ef088ab85e87a4d9187ac8f0587d4ec0bf7c941af787f94414f21b4931203663d05ca5256f8834ea64d2e0ff515e0e926262c04d6fac8c481303004417d4dc767a1ac4473f3b7f94a9b064e532e9324b8c60d69617639f24fbf226ae064dea3938fc0664d192b14b76210ee3a0385c81392e28a4577e2cdd0c37e0b6f4dea0d06bb084ec047df7cfea8784c51161269c4e120782986269d275de2070d54caf6a30ad705ed1a646173dfd025e94678e3f09", 0xd2, 0x8000, &(0x7f00000001c0)={0xa, 0x4e24, 0x2, @mcast2}, 0x1c) r2 = socket$inet6(0xa, 0x0, 0x7) setsockopt$inet6_buf(r2, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r2, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r2, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:13 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0xf]}}]}, 0x80}}, 0x0) 03:55:13 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0xf, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xab0}, 0x28) 03:55:13 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x3bd}, 0x28) 03:55:13 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0xffffffffa0010000]}}]}, 0x80}}, 0x0) 03:55:13 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x4000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xb92}, 0x28) 03:55:14 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}, 0x1c) close(r1) 03:55:14 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xffff, 0x80000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x3, 0x1, 0x2, 0x0, 0x3}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000380)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x18, @empty, 0x9}, @in6={0xa, 0x4e22, 0x401, @mcast2, 0x2}, @in6={0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x16}}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e20, 0x100000001, @mcast2, 0x10000}, @in={0x2, 0x4e22, @loopback}], 0xb0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={r1, @in6={{0xa, 0x4e24, 0x7, @local, 0x1}}, [0x9e8, 0x4, 0x7ff, 0x10001, 0x1, 0x100000000, 0xffff, 0x3, 0x4, 0x3ff, 0x9, 0x5, 0x8, 0x862, 0x81]}, &(0x7f00000002c0)=0x100) r3 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000440)={r2, @in={{0x2, 0x4e20, @rand_addr=0x2}}, 0x10000, 0x5, 0x40, 0x2, 0xbb}, 0x98) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) connect(r3, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r3, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:14 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x9f3}, 0x28) 03:55:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x566}, 0x28) 03:55:14 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0xff3f0000]}}]}, 0x80}}, 0x0) 03:55:14 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0xf00000000000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:14 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x4aa}, 0x28) 03:55:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xcf4}, 0x28) 03:55:14 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) [ 1881.109038] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:14 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x3f00000000000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:14 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x3fff]}}]}, 0x80}}, 0x0) 03:55:14 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}}, 0x1c) close(r1) [ 1881.169353] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1043}, 0x28) 03:55:14 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)="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"}, 0x10) 03:55:14 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x396}, 0x28) [ 1881.320113] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:14 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0xa0008000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:14 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x8000a0]}}]}, 0x80}}, 0x0) [ 1881.405702] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:14 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}}, 0x1c) close(r1) 03:55:14 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0xfffffffffffffece) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x12c9}, 0x28) 03:55:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x46c}, 0x28) [ 1881.551275] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:15 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x3f000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x35d}, 0x28) 03:55:15 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x2000]}}]}, 0x80}}, 0x0) 03:55:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}}, 0x1c) close(r1) 03:55:15 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x210400, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x80000000) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000000340)="ff02040000000205000000000000000000000002007bcd00", 0x18) connect(r1, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r1, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x6e0}, 0x28) [ 1881.800935] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa1c}, 0x28) 03:55:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x91f}, 0x28) 03:55:15 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x1, 0x4, 0x2, {0xa, 0x4e23, 0x8, @remote, 0x40}}}, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x410000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000240)=0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000080)={@ipv4={[], [], @local}}, &(0x7f00000000c0)=0x14) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x100, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f00000001c0)={0x739f, 0x9, 0x7fff, 0x4, 0x80000000, 0x1d4, 0x993a06b, 0x1ff, 0x3, 0x2, 0x4, 0x3}) semget$private(0x0, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000280)=0x4) 03:55:15 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x500]}}]}, 0x80}}, 0x0) [ 1881.874664] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:15 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0xffffffffa0010000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}, 0x1c) close(r1) 03:55:15 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x8000a0ffffffff]}}]}, 0x80}}, 0x0) 03:55:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x3a6}, 0x28) 03:55:15 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x38, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0xfffffffffffffe0b) connect(r0, &(0x7f0000000080)=@generic={0x5, "6b00a78198f90a8079294f3b4567053b5cf0c751bee038e0f12a6562a3d093c7efe28a871bfb02fdd809c0cee9f92f5e4b82161d806ebd01fe0613a04cd1d85df808aef76104b849fab027ac13d4dbb5c60265962be502054424119de8cf433dd94d6e1a1e9f74111bd309df241e18b556a127f6848cfd38ca5aff7f61a0"}, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xc8f}, 0x28) [ 1882.058189] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1882.130114] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:15 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0xffffffffa0008000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1500000000000000]}}, 0x1c) close(r1) 03:55:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x22a}, 0x28) 03:55:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xd38}, 0x28) 03:55:15 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0xffffffff00000000]}}]}, 0x80}}, 0x0) 03:55:15 executing program 5: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x12100, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x6a, "08cba52e08abfa471a180c4f75eff16104f026fe1a79f4b7471c702096541fbedabb8fc5a8d90739675213b389dc23cf6eff67ee6ef63eb5c82122bebdb4aa935abd82fcbc889bd612f9f79023df71716b757fb3a2aa30862be93da5de2d9bf07058e2f623d92244e80b"}, &(0x7f0000000100)=0x72) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)={r1, 0x3, 0x3, [0x8000, 0x1, 0x3]}, &(0x7f0000000200)=0xfffffffffffffeaf) sendmsg$kcm(r0, &(0x7f0000000400)={&(0x7f0000000240)=@ax25={0x3, {"bbf58c9c86a995"}, 0xff}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000380)="ade6684612d4278fe3e37a81eb6ad72e4ad373e378a5330b37743e12ff63ad1ad51475b2b6d627230eb9d1744ba49773436665e439cd9747632e1388f1531dab40f222a930559909c55a843bb8e8e0688958d68e494785e4ff07687e34eb3e3b836483f03d965314", 0x68}], 0x1, 0x0, 0x0, 0x4014}, 0x20000081) 03:55:15 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x500000000000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14280000000000]}}, 0x1c) close(r1) 03:55:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1009}, 0x28) 03:55:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xb7}, 0x28) 03:55:15 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) timer_create(0x5, &(0x7f0000000000)={0x0, 0x0, 0x4}, &(0x7f0000000040)=0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(r1, 0x1, &(0x7f00000000c0)={{r2, r3+10000000}}, &(0x7f0000000100)) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:16 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x40030000000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:16 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0xffffff7f00000000]}}]}, 0x80}}, 0x0) 03:55:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1131}, 0x28) 03:55:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xee2}, 0x28) 03:55:16 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}, 0x1c) close(r1) 03:55:16 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = memfd_create(&(0x7f0000000000)='\x00', 0x2) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000040)="96c4e4f3157d6ac5991d0f09e87b68685e6846f8473c4a77fe77f7fd4946d846d34478f77d864dd31f271db391b12847b2713d0b30d1048be4f2da22b9f93ab0172c769ccb51b7fb0d02b7b216fedf7c7fc37398fc34cc") setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) 03:55:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x11ae}, 0x28) 03:55:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x129e}, 0x28) 03:55:16 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0xefffffff, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:16 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:16 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0xff3f0000]}}]}, 0x80}}, 0x0) 03:55:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa14}, 0x28) 03:55:16 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000000)="ff02040000000205000000000000000000000000000000000aa20723e3faf94cd4bce948ad77ef43a0e9acdb839465b7fe463ebbe50513ad279d005fbf629999637bfbfb4fbb279ac61db7a46a57295bf9a90ac393ad76cee46b14cb2d8a5949238f1650bb3181ddcf063ba77ff498c12138745375fb9e12d235302d2be9c59ac3c5c48d2bcd4790084faacc032c884568dd50c5f3daf7a02cda65da54bf4a34b99452f37c6bd9bbd8d2d72b0b3a261d08fba1b50a1c23ef26c9da8740d7fb2544b6e46cfd3a", 0xc6) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) socket$inet6(0xa, 0x80000, 0x1) 03:55:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x130d}, 0x28) 03:55:16 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x5000000]}}]}, 0x80}}, 0x0) 03:55:16 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x20000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7530]}}, 0x1c) close(r1) 03:55:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x10c2}, 0x28) 03:55:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1480}, 0x28) 03:55:17 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:17 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0xffffff7f]}}]}, 0x80}}, 0x0) 03:55:17 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x2000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:17 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x5, 0x40) accept4$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000100)) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xe84b}) fcntl$notify(r0, 0x402, 0x0) r3 = syz_open_pts(r2, 0x0) read(r3, &(0x7f0000000080)=""/19, 0xffffff5c) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x881}, 0x28) 03:55:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x144c}, 0x28) 03:55:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x11ec}, 0x28) 03:55:17 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x2]}}]}, 0x80}}, 0x0) 03:55:17 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0xffffffef, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}, 0x1c) close(r1) 03:55:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x191}, 0x28) 03:55:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xbda}, 0x28) 03:55:17 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x100000000000000]}}]}, 0x80}}, 0x0) 03:55:17 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0xefffffff00000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x3e6}, 0x28) 03:55:18 executing program 5: r0 = socket$inet6(0xa, 0x7ff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) socketpair(0x1, 0x5, 0x2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040), 0xfffffffffffffec9) 03:55:18 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xc03}, 0x28) 03:55:18 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x1000000]}}]}, 0x80}}, 0x0) 03:55:18 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x1000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x8f7}, 0x28) 03:55:18 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xef9}, 0x28) 03:55:18 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0xa0008000]}}]}, 0x80}}, 0x0) 03:55:18 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000380)={[], 0x401, 0x9, 0x829, 0x7fffffff, 0x4, r2}) sendto$inet6(r0, &(0x7f0000000000), 0x4590, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0xb04}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000000c0)={r4, 0x0, 0x606, 0x8001}, &(0x7f0000000100)=0x10) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000280)) 03:55:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x9d2}, 0x28) 03:55:18 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x5000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:18 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x12ef}, 0x28) 03:55:18 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}}, 0x1c) close(r1) 03:55:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x2fe}, 0x28) 03:55:18 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x2d6}, 0x28) 03:55:18 executing program 5: r0 = socket$inet6(0xa, 0x6, 0xfffffffffffff801) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x28af8593, @loopback, 0x1}, 0x1c) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000380)="ff0204000000000082f45a0400001f00000000000000d83800000000ffa48a16b102c532ed78d46d7995d91b03d59356ceaa04c6db30a9206b3d1940e690253999d4d9b690f325b9a192507cf1e4232d7cde60b22dabbd3230d1e1e8b97a7198365d71480122bf4486028bb47b09e7ff426add42bc7c342490b0a3b9fbffa7f11c2b5c105635f09b29ad4bfa30d3db80d11846b3c308a984918d4cff6b79f3337925ad5df884961a3e5cef298865c59ab433becbfd703f1425cac8e1059c95", 0x1b) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000040)="f5c42fec0ff9cd827df4a9ed13bf4c23e86e6f17fd14d5c5e6158d1aba0f8f8ad775b527ca3e18a1ddea1460d26645252cd6111c9076555cfe3087b3b6a9bab959b792acb6956a342a5d14efb3b4dd139b1f88a0934e0be7561085293c7937965f05e1ae2dfde44069ea83c6463567125d9c866b25a96ee780e0a457d58bcc4481170509033c1eba9ea87b19a4c868cc8d3afebc51421f33e9c8199c274dd9e918883f893de84ec93c268bdfdd31288c61e19cc6cb9533a81d2ccf6178d26d20003513a28a89e87e7b8997ebf9c947946f8b10161cd8e601a0051321cc55ba6aa70000000000", 0x0, 0x40000000000000, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @remote}, 0x2c9) 03:55:18 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x8000a0ffffffff, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:18 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0xf00]}}]}, 0x80}}, 0x0) 03:55:19 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x21c}, 0x28) 03:55:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xe7}, 0x28) 03:55:19 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000000)=""/172, 0x7fff}) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:19 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xb2b}, 0x28) 03:55:19 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x4]}}]}, 0x80}}, 0x0) 03:55:19 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00]}}, 0x1c) close(r1) 03:55:19 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0xffffff7f, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:19 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x1) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000080)='\x00', 0xffffffffffffffff}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000100)=0x4415) setsockopt$llc_int(r1, 0x10c, 0x6, &(0x7f0000000040)=0x964, 0x4) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xf88}, 0x28) 03:55:19 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x4b}, 0x28) 03:55:19 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x400000000000000]}}]}, 0x80}}, 0x0) 03:55:19 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x13a3}, 0x28) [ 1886.272261] net_ratelimit: 4 callbacks suppressed [ 1886.272273] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:19 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x2, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x44b}, 0x28) 03:55:19 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x3f00000000000000]}}]}, 0x80}}, 0x0) 03:55:19 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002]}}, 0x1c) close(r1) 03:55:19 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa80}, 0x28) 03:55:19 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2880, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f00000000c0)={r2, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) sysinfo(&(0x7f00000001c0)=""/200) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xbeb}, 0x28) 03:55:20 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x100000000000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:20 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000040), 0x4) 03:55:20 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x441}, 0x28) 03:55:20 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x3f000000]}}]}, 0x80}}, 0x0) 03:55:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x6c9}, 0x28) 03:55:20 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000080)="ff0000000000000000000000007c0b706ead310b72730c89615f9a345972b2ec580db43766e495edeaf1e103c92b49af47ff78554b21c9c6209540f1481a45ee0c892772a707964d283dacc6272b671dc2a6957821bfd4032a36509dba000000000000000200000000", 0x69) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40400, 0x0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000040)=0x7) connect(r0, &(0x7f0000000140)=@in, 0x80) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000060000007f0000000000000003000000000000000600000000000000ffffff7fffffffff00000000000000000000000000000000000000000000000009000000070000002000000000000000010000000000000004000000000000007f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) fcntl$setstatus(r0, 0x4, 0xbfe) 03:55:20 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0xffffff7f00000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:20 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x77b}, 0x28) 03:55:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}}, 0x1c) close(r1) 03:55:20 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0xff3f]}}]}, 0x80}}, 0x0) 03:55:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x4e9}, 0x28) 03:55:20 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) 03:55:20 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xc21}, 0x28) 03:55:20 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x400000000000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x41}, 0x28) 03:55:20 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x2fc}, 0x28) 03:55:20 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000240)={0x0, {{0xa, 0x4e23, 0x1, @local, 0x8000}}}, 0x88) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) tkill(r1, 0x28) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) getresgid(&(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200)=0x0) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x201000, &(0x7f0000000380)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r2}}, {@cache_loose='cache=loose'}, {@cache_mmap='cache=mmap'}, {@cache_mmap='cache=mmap'}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@mmap='mmap'}, {@version_L='version=9p2000.L'}], [{@appraise_type='appraise_type=imasig'}, {@smackfsroot={'smackfsroot', 0x3d, "70726f6365746830766d6e657430b56d696d655f74797065"}}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 03:55:20 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x2000000000000000]}}]}, 0x80}}, 0x0) 03:55:20 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x1a0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x7cb}, 0x28) 03:55:21 executing program 5: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(0xffffffffffffffff, &(0x7f0000000080)=@vsock={0x28, 0x0, 0x2711, @my=0x0}, 0xfffffffffffffd19) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$smack_current(r0, &(0x7f0000000200)='^\x00', 0x2) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x201) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x9, 0x200) write$binfmt_script(r1, &(0x7f0000000100)={'#! ', './file0', [{0x20, '/dev/vcs#\x00'}, {0x20, '-'}, {0x20, "5c656d30236e6f6465767d656d315e6370757365746e6f646576f16c6f"}, {0x20, '/dev/vcs#\x00'}, {}, {0x20, '\'-'}, {0x20, '/dev/vcs#\x00'}, {0x20, "2f6465be2f766d732300"}, {0x20, '/dev/vcs#\x00'}], 0xa, "0f55a863f88765c62f0503637bc39c3a950aaadae01eece01428f16a28bb53f84eda12d19ee44889e9393d01be54218b7b61849d49799efba02cc130508a1241908ec8fe347184f189"}, 0xaf) 03:55:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x950}, 0x28) 03:55:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x10a0}, 0x28) 03:55:21 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x200000000000000]}}]}, 0x80}}, 0x0) 03:55:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}}, 0x1c) close(r1) 03:55:21 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x34000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x9b0}, 0x28) 03:55:21 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) userfaultfd(0x80807) 03:55:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x61d}, 0x28) 03:55:21 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0xf00000000000000]}}]}, 0x80}}, 0x0) 03:55:21 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0xffffffff00000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x101a}, 0x28) 03:55:21 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x7f) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xb243, 0x400000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x3800}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x110, r2, 0x325, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5c}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x51}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'dummy0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4562db30}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x337}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}]}, 0x110}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e21, 0x5, @remote, 0x1}, {0xa, 0x4e22, 0x0, @remote, 0xfffffffffffffffd}, 0x3, [0x8, 0x100000001, 0xfff, 0xe9c2, 0x5, 0x3, 0xffff, 0x2]}, 0x5c) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1113}, 0x28) 03:55:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x9fc}, 0x28) 03:55:22 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x20000000]}}]}, 0x80}}, 0x0) 03:55:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x7e2}, 0x28) 03:55:22 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0xa0010000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:22 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xf9d}, 0x28) 03:55:22 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x400) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c) close(r1) 03:55:22 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x3fff]}}]}, 0x80}}, 0x0) 03:55:22 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={0x0, 0xfffffffffffffe00, 0x1, [0x3]}, &(0x7f0000000040)=0xa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000080)={r1, 0x41, "51274dca58437224633a11183583a9f3ce6dcf3b741b5625b3e45a2fc3211f01d48928ad986d26cbfb8dc842d5f031c2e21dd85e2ce952269d47990dd0ebefd173"}, &(0x7f0000000100)=0x49) 03:55:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x121d}, 0x28) 03:55:22 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x13d2}, 0x28) 03:55:22 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x400300, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:22 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x1a0ffffffff]}}]}, 0x80}}, 0x0) [ 1889.201657] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}, 0x1c) close(r1) 03:55:22 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000029f2ee73cacc448cc000000000000000000", 0xfffffffffffffeff) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @local}, 0x1, 0x1, 0x1, 0x1}}, 0x80) connect(r0, &(0x7f0000000140)=@in, 0x80) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f0000000380)="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", 0xfb) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x497}, 0x28) 03:55:22 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1375}, 0x28) [ 1889.354007] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:22 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x500000000000000]}}]}, 0x80}}, 0x0) 03:55:22 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x3, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1889.440603] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}, 0x1c) close(r1) 03:55:22 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000380)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000540)=0xe8) getsockname(r0, &(0x7f0000000280)=@hci={0x1f, 0x0}, &(0x7f0000000480)=0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000004c0)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000580)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000000500)=0x3a6) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000840)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000880)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000980)=0xe8) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000240)=0x101, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000e40)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x201000}, 0xc, &(0x7f0000000e00)={&(0x7f0000000e80)=ANY=[@ANYBLOB="ac030000", @ANYRES16=r2, @ANYBLOB="0003f4e500008dfa9206d4b07411080001009263fe9aa7f8b63f16e3876144074f05c6e5050fc3afe0833feba70cc73898441d0589a98f399bfc3af15de43a6d153ccd5db078569ae2f48276854420ccd6a743eab5e47c0a50920c2e69c802309e16af1a98efeeebddac3a62a4523cb540c9678b97663fc182ed844a", @ANYRES32=r3, @ANYBLOB="a401020038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400020000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000800000008000600", @ANYRES32=r5, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000200000038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000008000300030000000800040006000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000800000008000600", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="e401020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400ff01000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400ff010000400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400a300000008000600", @ANYRES32=r9, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004002a00000008000600", @ANYRES32=r10, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r11, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400030000000800070000000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000100000008000600", @ANYRES32=r12], 0x3ac}, 0x1, 0x0, 0x0, 0x40}, 0x40000) r13 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8800, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r13) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x22c}, 0x28) 03:55:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x110}, 0x28) 03:55:23 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x2000000]}}]}, 0x80}}, 0x0) [ 1889.613581] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x4bd}, 0x28) 03:55:23 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) r1 = geteuid() fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) 03:55:23 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0xe, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1889.697096] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18020000]}}, 0x1c) close(r1) 03:55:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x12dd}, 0x28) 03:55:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1478}, 0x28) 03:55:23 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0xffffffffa0008000]}}]}, 0x80}}, 0x0) [ 1889.857598] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:23 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, &(0x7f0000000000)="adc14f46feffb79f25218113959659357774c55725d01e53be119db14b1d991e61f797cfe08cb2ecdae39be100573612469708f86d3e0310901ce0711b76fccc602eb447df84f517b14fe526ba4a124075d18203e2afa028b808626664", 0x5d, 0x801, &(0x7f0000000080)={0xa, 0x4e22, 0xfffffffffffffffc, @loopback, 0x800000000000000}, 0x1c) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f00000000c0)="ff0204000000020500000000000000000000000000000000", 0x18) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000100)=0x2) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000240)={0x12c, 0x17, 0x1, {0xfffffffffffffeeb, './file0'}}, 0x10) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0008000]}}, 0x1c) close(r1) 03:55:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xf0b}, 0x28) [ 1889.929030] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:23 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0xa, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:23 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x40030000000000]}}]}, 0x80}}, 0x0) 03:55:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x12ab}, 0x28) [ 1890.060419] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x491}, 0x28) 03:55:23 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xffffffff) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4, 0x2002) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15554]}}, 0x1c) close(r1) 03:55:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x42}, 0x28) 03:55:23 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xefffffff00000000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x866}, 0x28) 03:55:23 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0xa0010000]}}]}, 0x80}}, 0x0) 03:55:23 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1, 0x4}, 0x1c) 03:55:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x530}, 0x28) 03:55:23 executing program 5: 03:55:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x623}, 0x28) 03:55:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa0d}, 0x28) 03:55:23 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x8000a0ffffffff, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:24 executing program 5: 03:55:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff91]}}, 0x1c) close(r1) 03:55:24 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x400300]}}]}, 0x80}}, 0x0) 03:55:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xc41}, 0x28) 03:55:24 executing program 5: 03:55:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x694}, 0x28) 03:55:24 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4000000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:24 executing program 5: 03:55:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1062}, 0x28) 03:55:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x600}, 0x28) 03:55:24 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x3f00]}}]}, 0x80}}, 0x0) 03:55:24 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x5000000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:24 executing program 5: 03:55:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}, 0x1c) close(r1) 03:55:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x59d}, 0x28) 03:55:25 executing program 5: 03:55:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x9fd}, 0x28) 03:55:25 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0xf]}}]}, 0x80}}, 0x0) 03:55:25 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x1a0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:25 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) [ 1891.944196] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x904}, 0x28) 03:55:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xdae}, 0x28) [ 1892.013459] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:25 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x1000000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:25 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x39a) connect(r0, &(0x7f0000000000)=@in, 0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fcd7"]) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000400), 0x100000000000000c) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000dc0)=""/52, 0x34}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x22, &(0x7f0000006340)) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000200)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) getgroups(0x0, &(0x7f0000000240)) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhci\x00', 0x400200, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') ioctl$UI_SET_PHYS(r4, 0x4008556c, &(0x7f0000000240)='syz0\x00') getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x817, 0x9}, &(0x7f0000000640)=0x18) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000680)={r5, 0x1}, &(0x7f00000006c0)=0x8) setresgid(0x0, 0x0, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000005c0)={0x0, 0x5b, "b338f2dc627e08f59ac875176ec5e20dbb80a8c532a7070a63b5e943dded97d5b0151883da14a102abcddd86d3408d7e1864bd6b11fb16295c2c4642abff1ec7dba31e7b1b85777f32f092fed45765c7e3b58d501e65a09fbcb7d5"}, &(0x7f00000003c0)=0x63) ioctl$KVM_RUN(r3, 0xae80, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 03:55:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x983a000000000000]}}, 0x1c) close(r1) 03:55:25 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x34000]}}]}, 0x80}}, 0x0) 03:55:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1027}, 0x28) 03:55:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xf59}, 0x28) [ 1892.235029] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:25 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x400000000000000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1892.293532] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88020000]}}, 0x1c) close(r1) 03:55:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x3eb}, 0x28) 03:55:25 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x605}, 0x28) 03:55:25 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x1a0]}}]}, 0x80}}, 0x0) 03:55:25 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xf00000000000000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xe02}, 0x28) [ 1892.487981] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:26 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1, 0xd3700000}, 0x1c) 03:55:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x132e}, 0x28) 03:55:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f0000]}}, 0x1c) close(r1) 03:55:26 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x4000000]}}]}, 0x80}}, 0x0) 03:55:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x7f6}, 0x28) 03:55:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x8cf}, 0x28) 03:55:26 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1, 0x500}, 0x1c) 03:55:26 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xf000000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1892.765726] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1892.832440] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xcf5}, 0x28) 03:55:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803]}}, 0x1c) close(r1) 03:55:26 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0xf000000]}}]}, 0x80}}, 0x0) 03:55:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xcbe}, 0x28) 03:55:26 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xca}, 0x28) 03:55:26 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x2000000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x34b}, 0x28) 03:55:26 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000020500000000000000000000000000000000", 0x18) connect(r0, &(0x7f0000000140)=@in, 0x80) sendto$inet6(r0, &(0x7f0000000000), 0xffcb, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1, 0xd3de}, 0x1c) 03:55:26 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x5]}}]}, 0x80}}, 0x0) 03:55:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x76e}, 0x28) 03:55:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1159}, 0x28) 03:55:26 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x10e1}, 0x28) 03:55:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x101b}, 0x28) 03:55:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}}, 0x1c) close(r1) 03:55:27 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xefffffff, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:27 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0xffffffffa0010000]}}]}, 0x80}}, 0x0) 03:55:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xe81}, 0x28) 03:55:27 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}}, 0x1c) close(r1) 03:55:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xaea}, 0x28) [ 1893.882207] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xd76}, 0x28) [ 1893.937015] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x8dd}, 0x28) 03:55:27 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x500000000000000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:27 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0xff3f000000000000]}}]}, 0x80}}, 0x0) [ 1894.023971] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:27 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x66e}, 0x28) 03:55:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000]}}, 0x1c) close(r1) 03:55:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa4f}, 0x28) 03:55:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xd98}, 0x28) 03:55:27 executing program 5 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:27 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x34000]}}]}, 0x80}}, 0x0) 03:55:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x49a}, 0x28) 03:55:27 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xa0008000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000000000]}}, 0x1c) close(r1) 03:55:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x685}, 0x28) [ 1894.390421] FAULT_INJECTION: forcing a failure. [ 1894.390421] name failslab, interval 1, probability 0, space 0, times 0 [ 1894.444388] CPU: 1 PID: 11611 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1894.451392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1894.460766] Call Trace: [ 1894.463391] dump_stack+0x244/0x39d [ 1894.467062] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1894.472279] ? debug_smp_processor_id+0x1c/0x20 [ 1894.476970] ? perf_trace_lock+0x14d/0x7a0 [ 1894.481231] should_fail.cold.4+0xa/0x17 [ 1894.485314] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1894.490463] ? __f_unlock_pos+0x19/0x20 [ 1894.494448] ? lock_downgrade+0x900/0x900 [ 1894.498616] ? proc_fail_nth_write+0x9e/0x210 [ 1894.503143] ? find_held_lock+0x36/0x1c0 [ 1894.507265] ? perf_trace_sched_process_exec+0x860/0x860 [ 1894.512744] __should_failslab+0x124/0x180 [ 1894.516993] should_failslab+0x9/0x14 [ 1894.520805] __kmalloc_track_caller+0x2d0/0x750 [ 1894.525489] ? strncpy_from_user+0x5a0/0x5a0 [ 1894.529911] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1894.535460] ? strndup_user+0x77/0xd0 [ 1894.539276] memdup_user+0x2c/0xa0 [ 1894.542825] strndup_user+0x77/0xd0 [ 1894.546474] ksys_mount+0x3c/0x140 [ 1894.550031] __x64_sys_mount+0xbe/0x150 [ 1894.554023] do_syscall_64+0x1b9/0x820 [ 1894.557924] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1894.563306] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1894.568242] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1894.573099] ? trace_hardirqs_on_caller+0x310/0x310 [ 1894.578127] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1894.583154] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1894.588188] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1894.593050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1894.598247] RIP: 0033:0x457569 [ 1894.601454] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1894.620371] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1894.628131] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1894.635410] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 03:55:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1227}, 0x28) [ 1894.642691] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1894.649969] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1894.657245] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:28 executing program 5 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x15b}, 0x28) 03:55:28 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0xa0008000]}}]}, 0x80}}, 0x0) 03:55:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x983a]}}, 0x1c) close(r1) 03:55:28 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xffffffff00000000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x8f6}, 0x28) 03:55:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x10}, 0x28) [ 1894.919662] FAULT_INJECTION: forcing a failure. [ 1894.919662] name failslab, interval 1, probability 0, space 0, times 0 [ 1894.945634] CPU: 1 PID: 11641 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1894.952594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1894.961963] Call Trace: [ 1894.964579] dump_stack+0x244/0x39d [ 1894.968438] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1894.973664] ? debug_smp_processor_id+0x1c/0x20 [ 1894.978364] ? perf_trace_lock+0x14d/0x7a0 [ 1894.982660] should_fail.cold.4+0xa/0x17 [ 1894.986754] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1894.991907] ? lock_is_held_type+0x210/0x210 [ 1894.996357] ? save_stack+0x43/0xd0 [ 1895.000037] ? kasan_kmalloc+0xc7/0xe0 [ 1895.003939] ? __kmalloc_track_caller+0x14a/0x750 [ 1895.008788] ? memdup_user+0x2c/0xa0 [ 1895.012513] ? do_syscall_64+0x1b9/0x820 [ 1895.016583] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1895.021955] ? proc_fail_nth_write+0x9e/0x210 [ 1895.026474] ? find_held_lock+0x36/0x1c0 [ 1895.030554] ? parse_no_kvmclock_vsyscall+0x7/0xd [ 1895.035435] ? perf_trace_sched_process_exec+0x860/0x860 [ 1895.040910] ? lock_release+0xa00/0xa00 [ 1895.044905] ? perf_trace_sched_process_exec+0x860/0x860 [ 1895.050385] __should_failslab+0x124/0x180 [ 1895.054639] should_failslab+0x9/0x14 [ 1895.058448] __kmalloc_track_caller+0x2d0/0x750 [ 1895.063135] ? strncpy_from_user+0x5a0/0x5a0 [ 1895.067554] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1895.073124] ? strndup_user+0x77/0xd0 [ 1895.077445] memdup_user+0x2c/0xa0 [ 1895.080999] strndup_user+0x77/0xd0 [ 1895.084639] ksys_mount+0x73/0x140 [ 1895.088190] __x64_sys_mount+0xbe/0x150 [ 1895.092183] do_syscall_64+0x1b9/0x820 [ 1895.096100] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1895.101499] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1895.106464] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1895.111316] ? trace_hardirqs_on_caller+0x310/0x310 [ 1895.116339] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1895.121397] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1895.126444] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1895.131311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1895.136505] RIP: 0033:0x457569 [ 1895.139708] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1895.158611] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:55:28 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x5000000]}}]}, 0x80}}, 0x0) [ 1895.166368] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1895.173648] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1895.180922] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1895.188197] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1895.195482] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:28 executing program 5 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xd93}, 0x28) 03:55:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x58a}, 0x28) 03:55:28 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x400300, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1895.363514] FAULT_INJECTION: forcing a failure. [ 1895.363514] name failslab, interval 1, probability 0, space 0, times 0 [ 1895.396051] CPU: 1 PID: 11661 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1895.403005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:55:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x10be}, 0x28) [ 1895.412414] Call Trace: [ 1895.415025] dump_stack+0x244/0x39d [ 1895.418690] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1895.423918] ? debug_smp_processor_id+0x1c/0x20 [ 1895.428608] ? perf_trace_lock+0x14d/0x7a0 [ 1895.432885] should_fail.cold.4+0xa/0x17 [ 1895.436980] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1895.442098] ? lock_is_held_type+0x210/0x210 [ 1895.446536] ? kasan_kmalloc+0xc7/0xe0 [ 1895.450446] ? __kmalloc_track_caller+0x14a/0x750 [ 1895.455303] ? memdup_user+0x2c/0xa0 [ 1895.459032] ? zap_class+0x640/0x640 [ 1895.462760] ? do_syscall_64+0x1b9/0x820 [ 1895.466867] ? find_held_lock+0x36/0x1c0 [ 1895.470995] ? perf_trace_sched_process_exec+0x860/0x860 [ 1895.476450] ? lock_release+0xa00/0xa00 [ 1895.480432] ? perf_trace_sched_process_exec+0x860/0x860 [ 1895.485924] ? usercopy_warn+0x110/0x110 [ 1895.490007] __should_failslab+0x124/0x180 [ 1895.494276] should_failslab+0x9/0x14 [ 1895.498086] kmem_cache_alloc_trace+0x2d7/0x750 [ 1895.502767] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1895.508313] ? _copy_from_user+0xdf/0x150 [ 1895.512474] copy_mount_options+0x5f/0x430 [ 1895.516716] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1895.522303] ksys_mount+0xd0/0x140 [ 1895.525862] __x64_sys_mount+0xbe/0x150 [ 1895.529871] do_syscall_64+0x1b9/0x820 [ 1895.533774] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1895.539147] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1895.544080] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1895.548946] ? trace_hardirqs_on_caller+0x310/0x310 [ 1895.553975] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1895.559005] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1895.564055] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1895.568920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1895.574112] RIP: 0033:0x457569 [ 1895.577339] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1895.596281] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1895.604012] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 03:55:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1456}, 0x28) [ 1895.611284] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1895.618555] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1895.625826] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1895.633103] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:29 executing program 5 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 1895.807154] FAULT_INJECTION: forcing a failure. [ 1895.807154] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1895.819021] CPU: 0 PID: 11681 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1895.825959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1895.835325] Call Trace: [ 1895.837937] dump_stack+0x244/0x39d [ 1895.841597] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1895.846829] should_fail.cold.4+0xa/0x17 [ 1895.850925] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1895.856036] ? __lock_acquire+0x62f/0x4c20 [ 1895.860258] ? lock_downgrade+0x900/0x900 [ 1895.864392] ? check_preemption_disabled+0x48/0x280 [ 1895.869403] ? mark_held_locks+0x130/0x130 [ 1895.873629] ? mark_held_locks+0x130/0x130 [ 1895.877906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1895.883456] ? check_preemption_disabled+0x48/0x280 [ 1895.888463] ? kernel_text_address+0x79/0xf0 [ 1895.892885] ? debug_smp_processor_id+0x1c/0x20 [ 1895.897552] ? perf_trace_lock+0x14d/0x7a0 [ 1895.901788] ? debug_smp_processor_id+0x1c/0x20 [ 1895.906447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1895.911974] ? should_fail+0x22d/0xd01 [ 1895.915857] ? lock_is_held_type+0x210/0x210 [ 1895.920262] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1895.925351] ? lock_is_held_type+0x210/0x210 [ 1895.929771] __alloc_pages_nodemask+0x34b/0xde0 [ 1895.934460] ? __kmalloc_track_caller+0x14a/0x750 [ 1895.939293] ? memdup_user+0x2c/0xa0 [ 1895.943000] ? __alloc_pages_slowpath+0x2d70/0x2d70 [ 1895.948026] ? find_held_lock+0x36/0x1c0 [ 1895.952095] ? trace_hardirqs_off+0xb8/0x310 [ 1895.956495] cache_grow_begin+0xa5/0x8c0 [ 1895.960572] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1895.966114] ? check_preemption_disabled+0x48/0x280 [ 1895.971127] kmem_cache_alloc_trace+0x684/0x750 [ 1895.975799] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1895.981333] copy_mount_options+0x5f/0x430 [ 1895.985574] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1895.991104] ksys_mount+0xd0/0x140 [ 1895.994637] __x64_sys_mount+0xbe/0x150 [ 1895.998610] do_syscall_64+0x1b9/0x820 [ 1896.002504] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1896.007862] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1896.012785] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1896.017615] ? trace_hardirqs_on_caller+0x310/0x310 [ 1896.022619] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1896.027623] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1896.032676] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1896.037514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1896.042690] RIP: 0033:0x457569 [ 1896.045893] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1896.064781] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1896.072475] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1896.079735] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1896.087206] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1896.094475] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 03:55:29 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x4000000]}}]}, 0x80}}, 0x0) 03:55:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x578}, 0x28) 03:55:29 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x500, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3075]}}, 0x1c) close(r1) 03:55:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x12fe}, 0x28) [ 1896.101733] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:29 executing program 5 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x75a}, 0x28) 03:55:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xba9}, 0x28) [ 1896.308460] FAULT_INJECTION: forcing a failure. [ 1896.308460] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1896.320322] CPU: 0 PID: 11707 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1896.327285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1896.336647] Call Trace: [ 1896.339269] dump_stack+0x244/0x39d [ 1896.342924] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1896.348147] should_fail.cold.4+0xa/0x17 [ 1896.352222] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1896.357336] ? debug_smp_processor_id+0x1c/0x20 [ 1896.362014] ? perf_trace_lock+0x14d/0x7a0 [ 1896.366266] ? mark_held_locks+0x130/0x130 [ 1896.370503] ? debug_smp_processor_id+0x1c/0x20 [ 1896.375222] ? zap_class+0x640/0x640 [ 1896.378938] ? lock_is_held_type+0x210/0x210 [ 1896.383357] ? print_usage_bug+0xc0/0xc0 [ 1896.387444] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1896.392988] ? check_preemption_disabled+0x48/0x280 [ 1896.398015] ? debug_smp_processor_id+0x1c/0x20 [ 1896.402691] ? perf_trace_lock+0x14d/0x7a0 [ 1896.406940] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1896.412497] ? should_fail+0x22d/0xd01 [ 1896.416402] ? lock_is_held_type+0x210/0x210 [ 1896.420839] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1896.425971] ? is_bpf_text_address+0xac/0x170 [ 1896.430484] __alloc_pages_nodemask+0x34b/0xde0 [ 1896.435164] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1896.440104] ? kasan_check_read+0x11/0x20 [ 1896.444263] ? __alloc_pages_slowpath+0x2d70/0x2d70 [ 1896.449289] ? rcu_softirq_qs+0x20/0x20 [ 1896.453266] ? unwind_dump+0x190/0x190 [ 1896.457162] ? find_held_lock+0x36/0x1c0 [ 1896.461236] ? ip6_mc_input+0xa68/0xd20 [ 1896.465239] ? trace_hardirqs_off+0xb8/0x310 [ 1896.469661] cache_grow_begin+0xa5/0x8c0 [ 1896.473724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1896.479266] ? check_preemption_disabled+0x48/0x280 [ 1896.484295] kmem_cache_alloc+0x66b/0x730 [ 1896.488466] getname_flags+0xd0/0x5a0 [ 1896.492337] user_path_at_empty+0x2d/0x50 [ 1896.496495] do_mount+0x177/0x31f0 [ 1896.500038] ? check_preemption_disabled+0x48/0x280 [ 1896.505073] ? copy_mount_string+0x40/0x40 [ 1896.509318] ? rcu_pm_notify+0xc0/0xc0 [ 1896.513227] ? copy_mount_options+0x5f/0x430 [ 1896.517642] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1896.522677] ? kmem_cache_alloc_trace+0x353/0x750 [ 1896.527527] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1896.533070] ? _copy_from_user+0xdf/0x150 [ 1896.537228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1896.542773] ? copy_mount_options+0x315/0x430 [ 1896.547281] ksys_mount+0x12d/0x140 [ 1896.550921] __x64_sys_mount+0xbe/0x150 [ 1896.554926] do_syscall_64+0x1b9/0x820 [ 1896.558822] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1896.564200] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1896.569133] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1896.573985] ? trace_hardirqs_on_caller+0x310/0x310 [ 1896.579019] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1896.584046] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1896.589078] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1896.593960] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1896.599178] RIP: 0033:0x457569 [ 1896.602401] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1896.621305] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1896.629041] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1896.636318] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1896.643589] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1896.650868] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 03:55:30 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xffffffffa0010000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:30 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x20000000]}}]}, 0x80}}, 0x0) 03:55:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x51d}, 0x28) [ 1896.658146] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xc9c}, 0x28) 03:55:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x23e}, 0x28) 03:55:30 executing program 5 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x609}, 0x28) [ 1896.906298] FAULT_INJECTION: forcing a failure. [ 1896.906298] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1896.918170] CPU: 1 PID: 11731 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1896.925110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1896.934503] Call Trace: [ 1896.937149] dump_stack+0x244/0x39d [ 1896.940819] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1896.946070] should_fail.cold.4+0xa/0x17 [ 1896.950174] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1896.955294] ? debug_smp_processor_id+0x1c/0x20 [ 1896.960058] ? perf_trace_lock+0x14d/0x7a0 [ 1896.964315] ? mark_held_locks+0x130/0x130 [ 1896.968771] ? print_usage_bug+0xc0/0xc0 [ 1896.972854] ? zap_class+0x640/0x640 [ 1896.976578] ? lock_is_held_type+0x210/0x210 [ 1896.980993] ? print_usage_bug+0xc0/0xc0 [ 1896.985062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1896.990604] ? check_preemption_disabled+0x48/0x280 [ 1896.995638] ? debug_smp_processor_id+0x1c/0x20 [ 1897.000313] ? perf_trace_lock+0x14d/0x7a0 [ 1897.004558] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1897.010106] ? should_fail+0x22d/0xd01 [ 1897.014005] ? lock_is_held_type+0x210/0x210 [ 1897.018428] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1897.023542] ? is_bpf_text_address+0xac/0x170 [ 1897.028053] __alloc_pages_nodemask+0x34b/0xde0 [ 1897.032754] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1897.037706] ? kasan_check_read+0x11/0x20 [ 1897.041890] ? __alloc_pages_slowpath+0x2d70/0x2d70 [ 1897.046917] ? rcu_softirq_qs+0x20/0x20 [ 1897.050901] ? unwind_dump+0x190/0x190 [ 1897.054804] ? find_held_lock+0x36/0x1c0 [ 1897.058994] ? trace_hardirqs_off+0xb8/0x310 [ 1897.063420] cache_grow_begin+0xa5/0x8c0 [ 1897.067490] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1897.073035] ? check_preemption_disabled+0x48/0x280 [ 1897.078066] kmem_cache_alloc+0x66b/0x730 [ 1897.082222] ? find_held_lock+0x36/0x1c0 [ 1897.086304] getname_flags+0xd0/0x5a0 [ 1897.090118] user_path_at_empty+0x2d/0x50 [ 1897.094281] do_mount+0x177/0x31f0 [ 1897.097827] ? check_preemption_disabled+0x48/0x280 [ 1897.102882] ? copy_mount_string+0x40/0x40 [ 1897.107127] ? rcu_pm_notify+0xc0/0xc0 [ 1897.111035] ? copy_mount_options+0x5f/0x430 [ 1897.115449] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1897.120476] ? kmem_cache_alloc_trace+0x353/0x750 [ 1897.125328] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1897.130890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1897.136439] ? copy_mount_options+0x315/0x430 [ 1897.140955] ksys_mount+0x12d/0x140 [ 1897.144598] __x64_sys_mount+0xbe/0x150 [ 1897.148603] do_syscall_64+0x1b9/0x820 [ 1897.152501] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1897.157884] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1897.162841] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1897.167707] ? trace_hardirqs_on_caller+0x310/0x310 [ 1897.172749] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1897.177776] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1897.182808] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1897.187669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1897.192871] RIP: 0033:0x457569 [ 1897.196080] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1897.214986] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1897.222702] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1897.229983] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1897.237283] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1897.244556] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 03:55:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}, 0x1c) close(r1) 03:55:30 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x5, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:30 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x1000000]}}]}, 0x80}}, 0x0) 03:55:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x841}, 0x28) [ 1897.251829] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:30 executing program 5 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x138}, 0x28) 03:55:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x144f}, 0x28) 03:55:30 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0xffffff7f]}}]}, 0x80}}, 0x0) [ 1897.422447] FAULT_INJECTION: forcing a failure. [ 1897.422447] name failslab, interval 1, probability 0, space 0, times 0 [ 1897.450450] CPU: 1 PID: 11750 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1897.457410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1897.466775] Call Trace: [ 1897.469385] dump_stack+0x244/0x39d [ 1897.473033] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1897.478239] ? debug_smp_processor_id+0x1c/0x20 [ 1897.482922] ? perf_trace_lock+0x14d/0x7a0 [ 1897.487176] should_fail.cold.4+0xa/0x17 [ 1897.491273] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1897.496393] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1897.501508] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1897.506634] ? trace_hardirqs_on+0xbd/0x310 [ 1897.510964] ? kasan_check_read+0x11/0x20 [ 1897.515121] ? ida_alloc_range+0x51e/0xad0 [ 1897.519367] ? save_stack+0x43/0xd0 [ 1897.523007] ? kasan_kmalloc+0xc7/0xe0 [ 1897.526900] ? kmem_cache_alloc+0x12e/0x730 [ 1897.531238] ? find_held_lock+0x36/0x1c0 [ 1897.535387] ? __irqentry_text_end+0x170150/0x1f9658 [ 1897.540522] ? perf_trace_sched_process_exec+0x860/0x860 [ 1897.545998] __should_failslab+0x124/0x180 [ 1897.550249] should_failslab+0x9/0x14 [ 1897.554054] __kmalloc_track_caller+0x2d0/0x750 [ 1897.558740] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1897.563764] ? kstrdup_const+0x66/0x80 [ 1897.567660] kstrdup+0x39/0x70 [ 1897.570873] kstrdup_const+0x66/0x80 [ 1897.574600] alloc_vfsmnt+0x186/0x990 [ 1897.578414] ? m_stop+0x20/0x20 [ 1897.581700] ? avc_has_extended_perms+0x15a0/0x15a0 [ 1897.586725] ? zap_class+0x640/0x640 [ 1897.590500] ? find_held_lock+0x36/0x1c0 [ 1897.594580] ? __get_fs_type+0x97/0xc0 [ 1897.598477] ? lock_downgrade+0x900/0x900 [ 1897.602639] ? lock_release+0xa00/0xa00 [ 1897.606620] ? selinux_mount+0x1dc/0x3c0 [ 1897.610701] vfs_kern_mount.part.35+0x90/0x4f0 [ 1897.615300] ? may_umount+0xb0/0xb0 [ 1897.618940] ? _raw_read_unlock+0x2c/0x50 [ 1897.623092] ? __get_fs_type+0x97/0xc0 [ 1897.626997] do_mount+0x581/0x31f0 [ 1897.630573] ? check_preemption_disabled+0x48/0x280 [ 1897.635606] ? copy_mount_string+0x40/0x40 [ 1897.639875] ? copy_mount_options+0x5f/0x430 [ 1897.644296] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1897.649321] ? kmem_cache_alloc_trace+0x353/0x750 [ 1897.654193] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1897.659742] ? _copy_from_user+0xdf/0x150 [ 1897.663903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1897.669462] ? copy_mount_options+0x315/0x430 [ 1897.673974] ksys_mount+0x12d/0x140 [ 1897.677613] __x64_sys_mount+0xbe/0x150 [ 1897.681602] do_syscall_64+0x1b9/0x820 [ 1897.685500] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1897.690880] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1897.695816] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1897.700676] ? trace_hardirqs_on_caller+0x310/0x310 [ 1897.705699] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1897.710725] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1897.715756] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1897.720631] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1897.725861] RIP: 0033:0x457569 [ 1897.729069] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1897.747975] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1897.755692] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1897.762980] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 03:55:31 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x2000000000000000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1527}, 0x28) [ 1897.770255] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1897.777525] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1897.784796] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:31 executing program 5 (fault-call:2 fault-nth:7): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1bd}, 0x28) [ 1897.906418] FAULT_INJECTION: forcing a failure. [ 1897.906418] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1897.922515] CPU: 1 PID: 11769 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1897.929472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1897.938841] Call Trace: [ 1897.941462] dump_stack+0x244/0x39d [ 1897.945121] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1897.950322] ? perf_trace_lock+0x14d/0x7a0 [ 1897.954571] ? rcu_pm_notify+0xc0/0xc0 [ 1897.958570] should_fail.cold.4+0xa/0x17 [ 1897.962651] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1897.967757] ? pcpu_alloc+0x190/0x15e0 [ 1897.971660] ? zap_class+0x640/0x640 [ 1897.975407] ? find_held_lock+0x36/0x1c0 [ 1897.979495] ? __irqentry_text_end+0x18ec8/0x1f9658 [ 1897.984533] ? lock_release+0xa00/0xa00 [ 1897.988519] ? perf_trace_sched_process_exec+0x860/0x860 [ 1897.994115] ? __lockdep_init_map+0x105/0x590 [ 1897.998633] ? __might_sleep+0x95/0x190 [ 1898.002627] __alloc_pages_nodemask+0x34b/0xde0 [ 1898.007311] ? __alloc_pages_slowpath+0x2d70/0x2d70 [ 1898.012330] ? m_stop+0x20/0x20 [ 1898.015621] ? zap_class+0x640/0x640 [ 1898.019367] ? find_held_lock+0x36/0x1c0 [ 1898.023465] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1898.029020] alloc_pages_current+0x173/0x350 [ 1898.033450] get_zeroed_page+0x14/0x50 [ 1898.037348] mount_fs+0x20e/0x31d [ 1898.040823] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1898.045423] ? may_umount+0xb0/0xb0 [ 1898.049063] ? _raw_read_unlock+0x2c/0x50 [ 1898.053222] ? __get_fs_type+0x97/0xc0 [ 1898.057124] do_mount+0x581/0x31f0 [ 1898.060670] ? check_preemption_disabled+0x48/0x280 [ 1898.065703] ? copy_mount_string+0x40/0x40 [ 1898.069964] ? copy_mount_options+0x5f/0x430 [ 1898.074385] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1898.079654] ? kmem_cache_alloc_trace+0x353/0x750 [ 1898.084528] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1898.090075] ? _copy_from_user+0xdf/0x150 [ 1898.094238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1898.099783] ? copy_mount_options+0x315/0x430 [ 1898.104297] ksys_mount+0x12d/0x140 [ 1898.107942] __x64_sys_mount+0xbe/0x150 [ 1898.111957] do_syscall_64+0x1b9/0x820 [ 1898.115865] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1898.121243] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1898.126176] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1898.131034] ? trace_hardirqs_on_caller+0x310/0x310 [ 1898.136063] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1898.141089] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1898.146119] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1898.150990] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1898.156183] RIP: 0033:0x457569 [ 1898.159392] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1898.178301] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1898.186019] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1898.193291] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1898.200562] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1898.207840] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1898.215130] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0ffffffff]}}, 0x1c) close(r1) 03:55:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x834}, 0x28) 03:55:31 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x1a0]}}]}, 0x80}}, 0x0) 03:55:31 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xf00, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:31 executing program 5 (fault-call:2 fault-nth:8): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa1e}, 0x28) [ 1898.391866] FAULT_INJECTION: forcing a failure. [ 1898.391866] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1898.422685] CPU: 1 PID: 11785 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1898.429654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1898.439024] Call Trace: 03:55:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xfdc}, 0x28) 03:55:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x7bc}, 0x28) [ 1898.441639] dump_stack+0x244/0x39d [ 1898.445296] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1898.450534] ? perf_trace_lock+0x14d/0x7a0 [ 1898.454792] ? __lock_acquire+0x62f/0x4c20 [ 1898.459057] should_fail.cold.4+0xa/0x17 [ 1898.463158] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1898.468281] ? zap_class+0x640/0x640 [ 1898.472015] ? mark_held_locks+0x130/0x130 [ 1898.476271] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1898.481228] ? wait_for_completion+0x8a0/0x8a0 [ 1898.485840] ? find_held_lock+0x36/0x1c0 [ 1898.489947] ? lock_release+0xa00/0xa00 [ 1898.493949] ? perf_trace_sched_process_exec+0x860/0x860 [ 1898.499411] ? pcpu_alloc+0x190/0x15e0 [ 1898.503322] ? __might_sleep+0x95/0x190 [ 1898.507306] __alloc_pages_nodemask+0x34b/0xde0 [ 1898.511993] ? __alloc_pages_slowpath+0x2d70/0x2d70 [ 1898.517031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1898.522579] ? check_preemption_disabled+0x48/0x280 [ 1898.527614] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1898.533163] ? rcu_pm_notify+0xc0/0xc0 [ 1898.537071] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1898.542628] alloc_pages_current+0x173/0x350 [ 1898.547058] get_zeroed_page+0x14/0x50 [ 1898.550956] selinux_sb_copy_data+0xd3/0x740 [ 1898.555388] ? selinux_bprm_set_creds+0xd40/0xd40 [ 1898.560250] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1898.565021] ? find_held_lock+0x36/0x1c0 [ 1898.569101] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1898.574682] security_sb_copy_data+0x54/0xb0 [ 1898.579107] mount_fs+0x234/0x31d [ 1898.582578] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1898.587171] ? may_umount+0xb0/0xb0 [ 1898.590807] ? _raw_read_unlock+0x3f/0x50 [ 1898.594962] ? __get_fs_type+0x97/0xc0 [ 1898.598874] do_mount+0x581/0x31f0 [ 1898.602422] ? check_preemption_disabled+0x48/0x280 [ 1898.607454] ? copy_mount_string+0x40/0x40 [ 1898.611716] ? copy_mount_options+0x5f/0x430 [ 1898.616133] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1898.621158] ? kmem_cache_alloc_trace+0x353/0x750 [ 1898.626023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1898.631565] ? copy_mount_options+0x315/0x430 [ 1898.636082] ksys_mount+0x12d/0x140 [ 1898.639726] __x64_sys_mount+0xbe/0x150 [ 1898.643720] do_syscall_64+0x1b9/0x820 [ 1898.647617] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1898.653000] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1898.657944] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1898.662802] ? trace_hardirqs_on_caller+0x310/0x310 [ 1898.667830] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1898.672873] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1898.677907] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1898.682774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1898.687970] RIP: 0033:0x457569 [ 1898.691170] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1898.710087] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1898.717808] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1898.725097] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1898.732392] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1898.739669] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1898.746938] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:32 executing program 5 (fault-call:2 fault-nth:9): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x532}, 0x28) 03:55:32 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x3fff]}}]}, 0x80}}, 0x0) 03:55:32 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xf, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1898.907349] FAULT_INJECTION: forcing a failure. [ 1898.907349] name failslab, interval 1, probability 0, space 0, times 0 [ 1898.930791] CPU: 1 PID: 11808 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1898.937771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1898.947132] Call Trace: [ 1898.949742] dump_stack+0x244/0x39d [ 1898.953405] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1898.958617] ? debug_smp_processor_id+0x1c/0x20 [ 1898.963318] ? perf_trace_lock+0x14d/0x7a0 [ 1898.967709] should_fail.cold.4+0xa/0x17 [ 1898.971784] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1898.976899] ? perf_trace_lock+0x14d/0x7a0 [ 1898.981155] ? lock_is_held_type+0x210/0x210 [ 1898.985602] ? find_held_lock+0x36/0x1c0 [ 1898.989706] ? perf_trace_sched_process_exec+0x860/0x860 [ 1898.995183] ? sget_userns+0x1a9/0xf10 [ 1898.999097] __should_failslab+0x124/0x180 [ 1899.003345] should_failslab+0x9/0x14 [ 1899.007162] kmem_cache_alloc_trace+0x2d7/0x750 [ 1899.011866] sget_userns+0x1cf/0xf10 [ 1899.015612] ? get_anon_bdev+0xc0/0xc0 [ 1899.019521] ? grab_super+0x400/0x400 [ 1899.023338] ? selinux_ipv4_output+0x50/0x50 [ 1899.027770] ? __free_pages+0x103/0x190 [ 1899.031759] ? selinux_sb_copy_data+0x602/0x740 [ 1899.036455] ? selinux_capable+0x36/0x40 [ 1899.040529] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1899.046077] ? security_capable+0x99/0xc0 [ 1899.050241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1899.055844] ? ns_capable_common+0x13f/0x170 [ 1899.060291] ? get_anon_bdev+0xc0/0xc0 [ 1899.064184] sget+0x10b/0x150 [ 1899.067370] ? ovl_show_options+0x550/0x550 [ 1899.071713] mount_nodev+0x33/0x110 [ 1899.075351] ovl_mount+0x2c/0x40 [ 1899.078736] mount_fs+0xae/0x31d [ 1899.082122] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1899.086715] ? may_umount+0xb0/0xb0 [ 1899.090391] ? _raw_read_unlock+0x2c/0x50 [ 1899.094550] ? __get_fs_type+0x97/0xc0 [ 1899.098452] do_mount+0x581/0x31f0 [ 1899.102009] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1899.107473] ? retint_kernel+0x1b/0x2d [ 1899.111385] ? copy_mount_string+0x40/0x40 [ 1899.115638] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1899.120415] ? retint_kernel+0x2d/0x2d [ 1899.124326] ? copy_mount_options+0x239/0x430 [ 1899.128829] ? copy_mount_options+0x249/0x430 [ 1899.133342] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1899.138891] ? copy_mount_options+0x315/0x430 [ 1899.143407] ksys_mount+0x12d/0x140 [ 1899.147045] __x64_sys_mount+0xbe/0x150 [ 1899.151031] do_syscall_64+0x1b9/0x820 [ 1899.154925] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1899.160301] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1899.165237] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1899.170109] ? trace_hardirqs_on_caller+0x310/0x310 [ 1899.175136] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1899.180162] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1899.185286] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1899.190150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1899.195348] RIP: 0033:0x457569 [ 1899.198554] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1899.217463] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1899.225600] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1899.232880] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1899.240164] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1899.247436] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1899.254711] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5546ca0d00000000]}}, 0x1c) close(r1) 03:55:32 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x241}, 0x28) 03:55:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1a1}, 0x28) 03:55:32 executing program 5 (fault-call:2 fault-nth:10): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:32 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0xffffffffa0010000]}}]}, 0x80}}, 0x0) [ 1899.378790] net_ratelimit: 4 callbacks suppressed [ 1899.378802] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1899.415476] FAULT_INJECTION: forcing a failure. [ 1899.415476] name failslab, interval 1, probability 0, space 0, times 0 03:55:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xc7d}, 0x28) 03:55:32 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x40030000000000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1899.434937] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0010000]}}, 0x1c) close(r1) [ 1899.482200] CPU: 1 PID: 11826 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1899.489187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1899.498551] Call Trace: [ 1899.501159] dump_stack+0x244/0x39d [ 1899.504823] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1899.510057] ? debug_smp_processor_id+0x1c/0x20 [ 1899.514749] ? perf_trace_lock+0x14d/0x7a0 [ 1899.519014] should_fail.cold.4+0xa/0x17 [ 1899.523104] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1899.528227] ? kernel_text_address+0x79/0xf0 [ 1899.530882] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1899.532663] ? __save_stack_trace+0x8d/0xf0 [ 1899.532688] ? zap_class+0x640/0x640 [ 1899.532717] ? find_held_lock+0x36/0x1c0 [ 1899.555140] ? __lock_is_held+0xb5/0x140 [ 1899.559237] ? find_held_lock+0x36/0x1c0 [ 1899.563327] ? perf_trace_sched_process_exec+0x860/0x860 [ 1899.568820] __should_failslab+0x124/0x180 [ 1899.573094] should_failslab+0x9/0x14 [ 1899.576918] kmem_cache_alloc_trace+0x2d7/0x750 [ 1899.581610] ? kasan_check_write+0x14/0x20 [ 1899.585879] ? __init_rwsem+0x1cc/0x2a0 [ 1899.589897] selinux_sb_alloc_security+0x9b/0x2f0 [ 1899.594400] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1899.594761] ? selinux_inode_alloc_security+0x3a0/0x3a0 [ 1899.594783] ? down_write_nested+0x8e/0x130 [ 1899.594799] ? sget_userns+0x2e5/0xf10 [ 1899.594819] ? _down_write_nest_lock+0x130/0x130 [ 1899.594842] security_sb_alloc+0x4c/0xa0 [ 1899.627544] sget_userns+0x2ed/0xf10 03:55:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8004]}}, 0x1c) close(r1) [ 1899.631271] ? get_anon_bdev+0xc0/0xc0 [ 1899.635186] ? grab_super+0x400/0x400 [ 1899.639010] ? selinux_ipv4_output+0x50/0x50 [ 1899.643441] ? __free_pages+0x103/0x190 [ 1899.647439] ? selinux_sb_copy_data+0x602/0x740 [ 1899.652145] ? selinux_capable+0x36/0x40 [ 1899.656260] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1899.661822] ? security_capable+0x99/0xc0 [ 1899.666006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1899.671562] ? ns_capable_common+0x13f/0x170 [ 1899.675991] ? get_anon_bdev+0xc0/0xc0 [ 1899.679888] sget+0x10b/0x150 [ 1899.683165] ? ovl_show_options+0x550/0x550 [ 1899.687494] mount_nodev+0x33/0x110 [ 1899.691131] ovl_mount+0x2c/0x40 [ 1899.694509] mount_fs+0xae/0x31d [ 1899.697899] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1899.702500] ? may_umount+0xb0/0xb0 [ 1899.706134] ? _raw_read_unlock+0x2c/0x50 [ 1899.710291] ? __get_fs_type+0x97/0xc0 [ 1899.714197] do_mount+0x581/0x31f0 [ 1899.717742] ? check_preemption_disabled+0x48/0x280 [ 1899.722781] ? copy_mount_string+0x40/0x40 [ 1899.727038] ? copy_mount_options+0x5f/0x430 [ 1899.731453] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1899.736476] ? kmem_cache_alloc_trace+0x353/0x750 [ 1899.741334] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1899.746884] ? _copy_from_user+0xdf/0x150 [ 1899.751046] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1899.756603] ? copy_mount_options+0x315/0x430 [ 1899.761116] ksys_mount+0x12d/0x140 [ 1899.764759] __x64_sys_mount+0xbe/0x150 [ 1899.768750] do_syscall_64+0x1b9/0x820 [ 1899.772644] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1899.778024] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1899.782960] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1899.787810] ? trace_hardirqs_on_caller+0x310/0x310 [ 1899.792842] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1899.797893] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1899.802933] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1899.807815] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1899.813035] RIP: 0033:0x457569 [ 1899.816235] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1899.835146] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1899.842874] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1899.850235] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1899.857512] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1899.864785] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1899.872061] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x7d4}, 0x28) 03:55:33 executing program 5 (fault-call:2 fault-nth:11): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1109}, 0x28) 03:55:33 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x5]}}]}, 0x80}}, 0x0) [ 1899.995584] FAULT_INJECTION: forcing a failure. [ 1899.995584] name failslab, interval 1, probability 0, space 0, times 0 [ 1900.024334] CPU: 1 PID: 11854 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1900.031307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1900.040683] Call Trace: [ 1900.043291] dump_stack+0x244/0x39d [ 1900.046938] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1900.052142] ? debug_smp_processor_id+0x1c/0x20 [ 1900.056818] ? perf_trace_lock+0x14d/0x7a0 [ 1900.061088] should_fail.cold.4+0xa/0x17 [ 1900.065162] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1900.070289] ? zap_class+0x640/0x640 [ 1900.074021] ? find_held_lock+0x36/0x1c0 [ 1900.078262] ? __lock_is_held+0xb5/0x140 [ 1900.082419] ? perf_trace_drv_set_tsf+0x6e8/0xa30 [ 1900.087285] ? __lockdep_init_map+0x105/0x590 [ 1900.091794] ? perf_trace_sched_process_exec+0x860/0x860 [ 1900.097261] ? lockdep_init_map+0x9/0x10 [ 1900.101345] __should_failslab+0x124/0x180 [ 1900.105600] should_failslab+0x9/0x14 [ 1900.109412] __kmalloc+0x2d4/0x760 [ 1900.112965] ? __init_waitqueue_head+0x9e/0x150 [ 1900.117643] ? init_wait_entry+0x1c0/0x1c0 [ 1900.121888] ? prealloc_shrinker+0xe5/0x330 [ 1900.126227] prealloc_shrinker+0xe5/0x330 [ 1900.130399] sget_userns+0x969/0xf10 [ 1900.134119] ? get_anon_bdev+0xc0/0xc0 [ 1900.138029] ? grab_super+0x400/0x400 [ 1900.141876] ? selinux_ipv4_output+0x50/0x50 [ 1900.146303] ? __free_pages+0x103/0x190 [ 1900.150291] ? selinux_sb_copy_data+0x602/0x740 [ 1900.154983] ? selinux_capable+0x36/0x40 [ 1900.159054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1900.164603] ? security_capable+0x99/0xc0 [ 1900.168792] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1900.174337] ? ns_capable_common+0x13f/0x170 [ 1900.178772] ? get_anon_bdev+0xc0/0xc0 [ 1900.182673] sget+0x10b/0x150 [ 1900.185794] ? ovl_show_options+0x550/0x550 [ 1900.190125] mount_nodev+0x33/0x110 [ 1900.193762] ovl_mount+0x2c/0x40 [ 1900.197140] mount_fs+0xae/0x31d [ 1900.200522] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1900.205114] ? may_umount+0xb0/0xb0 [ 1900.208759] ? _raw_read_unlock+0x2c/0x50 [ 1900.212917] ? __get_fs_type+0x97/0xc0 [ 1900.216979] do_mount+0x581/0x31f0 [ 1900.220528] ? check_preemption_disabled+0x48/0x280 [ 1900.225563] ? copy_mount_string+0x40/0x40 [ 1900.229826] ? copy_mount_options+0x5f/0x430 [ 1900.234251] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1900.239278] ? kmem_cache_alloc_trace+0x353/0x750 [ 1900.244132] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1900.249709] ? _copy_from_user+0xdf/0x150 [ 1900.253902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1900.259457] ? copy_mount_options+0x315/0x430 [ 1900.263968] ksys_mount+0x12d/0x140 [ 1900.267623] __x64_sys_mount+0xbe/0x150 [ 1900.271616] do_syscall_64+0x1b9/0x820 [ 1900.275517] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1900.280907] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1900.285861] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1900.290718] ? trace_hardirqs_on_caller+0x310/0x310 [ 1900.295740] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1900.300766] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1900.305800] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1900.310670] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1900.315876] RIP: 0033:0x457569 [ 1900.319078] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1900.338005] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:55:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x146b}, 0x28) 03:55:33 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xffffff7f, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1900.345725] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1900.353096] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1900.360393] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1900.367664] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1900.374939] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:33 executing program 5 (fault-call:2 fault-nth:12): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xdc2}, 0x28) 03:55:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}, 0x1c) close(r1) [ 1900.511736] FAULT_INJECTION: forcing a failure. [ 1900.511736] name failslab, interval 1, probability 0, space 0, times 0 [ 1900.552177] CPU: 1 PID: 11873 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1900.559139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1900.568503] Call Trace: [ 1900.571123] dump_stack+0x244/0x39d [ 1900.574787] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1900.579999] ? debug_smp_processor_id+0x1c/0x20 [ 1900.584676] ? perf_trace_lock+0x14d/0x7a0 [ 1900.588933] should_fail.cold.4+0xa/0x17 [ 1900.593019] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1900.598134] ? kernel_text_address+0x79/0xf0 [ 1900.602560] ? __save_stack_trace+0x8d/0xf0 [ 1900.606896] ? zap_class+0x640/0x640 [ 1900.610630] ? find_held_lock+0x36/0x1c0 [ 1900.614707] ? __lock_is_held+0xb5/0x140 [ 1900.618799] ? perf_trace_sched_process_exec+0x860/0x860 [ 1900.624281] __should_failslab+0x124/0x180 [ 1900.628552] should_failslab+0x9/0x14 [ 1900.632364] kmem_cache_alloc_trace+0x2d7/0x750 [ 1900.637048] ? kasan_check_write+0x14/0x20 [ 1900.641292] ? __init_rwsem+0x1cc/0x2a0 [ 1900.645285] selinux_sb_alloc_security+0x9b/0x2f0 [ 1900.650138] ? selinux_inode_alloc_security+0x3a0/0x3a0 [ 1900.655513] ? down_write_nested+0x8e/0x130 [ 1900.659840] ? sget_userns+0x2e5/0xf10 [ 1900.663749] ? _down_write_nest_lock+0x130/0x130 [ 1900.668524] security_sb_alloc+0x4c/0xa0 [ 1900.672607] sget_userns+0x2ed/0xf10 [ 1900.676335] ? get_anon_bdev+0xc0/0xc0 [ 1900.680249] ? grab_super+0x400/0x400 [ 1900.684060] ? selinux_ipv4_output+0x50/0x50 [ 1900.688481] ? __free_pages+0x103/0x190 [ 1900.692465] ? selinux_sb_copy_data+0x602/0x740 [ 1900.697156] ? selinux_capable+0x36/0x40 [ 1900.701226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1900.706773] ? security_capable+0x99/0xc0 [ 1900.710935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1900.716498] ? ns_capable_common+0x13f/0x170 [ 1900.720918] ? get_anon_bdev+0xc0/0xc0 [ 1900.724814] sget+0x10b/0x150 [ 1900.727941] ? ovl_show_options+0x550/0x550 [ 1900.732274] mount_nodev+0x33/0x110 [ 1900.735931] ovl_mount+0x2c/0x40 [ 1900.739310] mount_fs+0xae/0x31d [ 1900.742702] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1900.747293] ? may_umount+0xb0/0xb0 [ 1900.750954] ? _raw_read_unlock+0x2c/0x50 [ 1900.755110] ? __get_fs_type+0x97/0xc0 [ 1900.759014] do_mount+0x581/0x31f0 [ 1900.762561] ? check_preemption_disabled+0x48/0x280 [ 1900.767596] ? copy_mount_string+0x40/0x40 [ 1900.771868] ? copy_mount_options+0x5f/0x430 [ 1900.776290] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1900.781327] ? kmem_cache_alloc_trace+0x353/0x750 [ 1900.786212] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1900.791773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1900.797316] ? copy_mount_options+0x315/0x430 [ 1900.801831] ksys_mount+0x12d/0x140 [ 1900.805484] __x64_sys_mount+0xbe/0x150 [ 1900.809479] do_syscall_64+0x1b9/0x820 [ 1900.813397] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1900.818771] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1900.823710] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1900.828560] ? trace_hardirqs_on_caller+0x310/0x310 [ 1900.833584] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1900.838613] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1900.843670] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1900.848578] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1900.853779] RIP: 0033:0x457569 [ 1900.856980] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1900.875917] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1900.883635] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1900.890906] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 03:55:34 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x100000000000000]}}]}, 0x80}}, 0x0) 03:55:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x12dd}, 0x28) 03:55:34 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xffffffffa0008000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1900.898186] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1900.905458] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1900.912733] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x238}, 0x28) 03:55:34 executing program 5 (fault-call:2 fault-nth:13): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xe2a}, 0x28) [ 1901.083274] FAULT_INJECTION: forcing a failure. [ 1901.083274] name failslab, interval 1, probability 0, space 0, times 0 [ 1901.095829] CPU: 0 PID: 11898 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1901.102797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1901.112166] Call Trace: [ 1901.114776] dump_stack+0x244/0x39d [ 1901.118425] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1901.123633] ? debug_smp_processor_id+0x1c/0x20 [ 1901.128314] ? perf_trace_lock+0x14d/0x7a0 [ 1901.132568] should_fail.cold.4+0xa/0x17 [ 1901.136649] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1901.141781] ? zap_class+0x640/0x640 [ 1901.145519] ? find_held_lock+0x36/0x1c0 [ 1901.149608] ? __lock_is_held+0xb5/0x140 [ 1901.153681] ? kvm_arch_vm_ioctl+0x18e8/0x26d0 [ 1901.158285] ? __lockdep_init_map+0x105/0x590 [ 1901.162793] ? perf_trace_sched_process_exec+0x860/0x860 [ 1901.168255] ? lockdep_init_map+0x9/0x10 [ 1901.172338] __should_failslab+0x124/0x180 [ 1901.176589] should_failslab+0x9/0x14 [ 1901.180406] __kmalloc+0x2d4/0x760 [ 1901.183958] ? __init_waitqueue_head+0x9e/0x150 [ 1901.188636] ? init_wait_entry+0x1c0/0x1c0 [ 1901.192889] ? prealloc_shrinker+0xe5/0x330 [ 1901.197224] prealloc_shrinker+0xe5/0x330 [ 1901.201386] sget_userns+0x969/0xf10 [ 1901.205125] ? get_anon_bdev+0xc0/0xc0 [ 1901.209056] ? grab_super+0x400/0x400 [ 1901.212888] ? selinux_ipv4_output+0x50/0x50 [ 1901.217318] ? __free_pages+0x103/0x190 [ 1901.221305] ? selinux_sb_copy_data+0x602/0x740 [ 1901.225998] ? selinux_capable+0x36/0x40 [ 1901.230071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1901.235618] ? security_capable+0x99/0xc0 [ 1901.239781] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1901.245335] ? ns_capable_common+0x13f/0x170 [ 1901.249764] ? get_anon_bdev+0xc0/0xc0 [ 1901.253712] sget+0x10b/0x150 [ 1901.256835] ? ovl_show_options+0x550/0x550 [ 1901.261182] mount_nodev+0x33/0x110 [ 1901.264822] ovl_mount+0x2c/0x40 [ 1901.268211] mount_fs+0xae/0x31d [ 1901.271595] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1901.276189] ? may_umount+0xb0/0xb0 [ 1901.279825] ? _raw_read_unlock+0x2c/0x50 [ 1901.283989] ? __get_fs_type+0x97/0xc0 [ 1901.287910] do_mount+0x581/0x31f0 [ 1901.291467] ? check_preemption_disabled+0x48/0x280 [ 1901.296502] ? copy_mount_string+0x40/0x40 [ 1901.300778] ? copy_mount_options+0x5f/0x430 [ 1901.305195] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1901.310221] ? kmem_cache_alloc_trace+0x353/0x750 [ 1901.315082] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1901.320636] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1901.326189] ? copy_mount_options+0x315/0x430 [ 1901.330711] ksys_mount+0x12d/0x140 [ 1901.334353] __x64_sys_mount+0xbe/0x150 [ 1901.338343] do_syscall_64+0x1b9/0x820 [ 1901.342253] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1901.347633] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1901.352570] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1901.357426] ? trace_hardirqs_on_caller+0x310/0x310 [ 1901.362455] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1901.367482] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1901.372520] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1901.377386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1901.382585] RIP: 0033:0x457569 [ 1901.385790] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1901.404698] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1901.412417] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1901.419694] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1901.426970] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1901.434242] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1901.441518] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:34 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x500000000000000]}}]}, 0x80}}, 0x0) 03:55:34 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x2, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x6fc}, 0x28) 03:55:35 executing program 5 (fault-call:2 fault-nth:14): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa2f}, 0x28) [ 1901.639590] FAULT_INJECTION: forcing a failure. [ 1901.639590] name failslab, interval 1, probability 0, space 0, times 0 [ 1901.680915] CPU: 1 PID: 11914 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1901.687893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1901.697260] Call Trace: [ 1901.699887] dump_stack+0x244/0x39d [ 1901.703546] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1901.708770] ? debug_smp_processor_id+0x1c/0x20 [ 1901.713468] ? perf_trace_lock+0x14d/0x7a0 [ 1901.717733] should_fail.cold.4+0xa/0x17 [ 1901.721833] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1901.726996] ? zap_class+0x640/0x640 [ 1901.730742] ? save_stack+0xa9/0xd0 [ 1901.734449] ? save_stack+0x43/0xd0 [ 1901.738094] ? kasan_kmalloc+0xc7/0xe0 [ 1901.738109] ? __kmalloc+0x14e/0x760 [ 1901.738134] ? find_held_lock+0x36/0x1c0 [ 1901.738158] ? __lock_is_held+0xb5/0x140 [ 1901.738200] ? perf_trace_sched_process_exec+0x860/0x860 [ 1901.738217] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1901.738233] ? check_preemption_disabled+0x48/0x280 [ 1901.738271] __should_failslab+0x124/0x180 [ 1901.774248] should_failslab+0x9/0x14 03:55:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480]}}, 0x1c) close(r1) 03:55:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x735}, 0x28) 03:55:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x8e3}, 0x28) 03:55:35 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xffffffef, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1901.778073] kmem_cache_alloc_node_trace+0x270/0x740 [ 1901.783216] __kmalloc_node+0x33/0x70 [ 1901.787040] kvmalloc_node+0x65/0xf0 [ 1901.790788] __list_lru_init+0x5d9/0x840 [ 1901.794885] ? list_lru_destroy+0x500/0x500 [ 1901.799236] ? up_write+0x7b/0x220 [ 1901.802808] ? down_write_nested+0x130/0x130 [ 1901.807248] ? down_read+0x120/0x120 [ 1901.810983] ? init_wait_entry+0x1c0/0x1c0 [ 1901.815232] ? prealloc_shrinker+0xe5/0x330 [ 1901.819602] sget_userns+0x999/0xf10 [ 1901.823343] ? get_anon_bdev+0xc0/0xc0 [ 1901.827265] ? grab_super+0x400/0x400 [ 1901.831106] ? selinux_ipv4_output+0x50/0x50 [ 1901.835571] ? __free_pages+0x103/0x190 [ 1901.839569] ? selinux_sb_copy_data+0x602/0x740 [ 1901.844273] ? selinux_capable+0x36/0x40 [ 1901.848357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1901.853924] ? security_capable+0x99/0xc0 [ 1901.858100] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1901.863658] ? ns_capable_common+0x13f/0x170 [ 1901.868080] ? get_anon_bdev+0xc0/0xc0 [ 1901.871977] sget+0x10b/0x150 [ 1901.875101] ? ovl_show_options+0x550/0x550 [ 1901.879431] mount_nodev+0x33/0x110 [ 1901.883101] ovl_mount+0x2c/0x40 [ 1901.886499] mount_fs+0xae/0x31d [ 1901.889899] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1901.894499] ? may_umount+0xb0/0xb0 [ 1901.898135] ? _raw_read_unlock+0x2c/0x50 [ 1901.902301] ? __get_fs_type+0x97/0xc0 [ 1901.906211] do_mount+0x581/0x31f0 [ 1901.909762] ? check_preemption_disabled+0x48/0x280 [ 1901.914796] ? copy_mount_string+0x40/0x40 [ 1901.919066] ? copy_mount_options+0x5f/0x430 [ 1901.923487] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1901.928516] ? kmem_cache_alloc_trace+0x353/0x750 [ 1901.933380] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1901.938930] ? _copy_from_user+0xdf/0x150 [ 1901.943104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1901.948669] ? copy_mount_options+0x315/0x430 [ 1901.953181] ksys_mount+0x12d/0x140 [ 1901.956822] __x64_sys_mount+0xbe/0x150 [ 1901.960824] do_syscall_64+0x1b9/0x820 [ 1901.964728] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1901.970109] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1901.975052] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1901.979908] ? trace_hardirqs_on_caller+0x310/0x310 [ 1901.984942] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1901.989976] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1901.995010] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1901.999887] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1902.005092] RIP: 0033:0x457569 [ 1902.008294] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:55:35 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0xffffffff00000000]}}]}, 0x80}}, 0x0) [ 1902.027210] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1902.034928] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1902.042203] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1902.049481] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1902.056754] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1902.064028] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:35 executing program 5 (fault-call:2 fault-nth:15): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x5be}, 0x28) 03:55:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x734}, 0x28) [ 1902.175222] FAULT_INJECTION: forcing a failure. [ 1902.175222] name failslab, interval 1, probability 0, space 0, times 0 [ 1902.217778] CPU: 1 PID: 11940 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1902.224745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1902.234111] Call Trace: [ 1902.236725] dump_stack+0x244/0x39d [ 1902.240392] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1902.245605] ? debug_smp_processor_id+0x1c/0x20 [ 1902.250286] ? perf_trace_lock+0x14d/0x7a0 [ 1902.254541] should_fail.cold.4+0xa/0x17 [ 1902.258620] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1902.263752] ? zap_class+0x640/0x640 [ 1902.267475] ? save_stack+0xa9/0xd0 [ 1902.271117] ? save_stack+0x43/0xd0 [ 1902.274754] ? kasan_kmalloc+0xc7/0xe0 [ 1902.278647] ? __kmalloc+0x14e/0x760 [ 1902.282388] ? find_held_lock+0x36/0x1c0 [ 1902.286467] ? __lock_is_held+0xb5/0x140 [ 1902.290579] ? perf_trace_sched_process_exec+0x860/0x860 [ 1902.296037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1902.301581] ? check_preemption_disabled+0x48/0x280 [ 1902.306630] __should_failslab+0x124/0x180 [ 1902.310885] should_failslab+0x9/0x14 [ 1902.314697] kmem_cache_alloc_node_trace+0x270/0x740 [ 1902.319824] __kmalloc_node+0x33/0x70 [ 1902.323647] kvmalloc_node+0x65/0xf0 [ 1902.327383] __list_lru_init+0x5d9/0x840 [ 1902.331468] ? list_lru_destroy+0x500/0x500 [ 1902.335807] ? up_write+0x7b/0x220 [ 1902.339403] ? down_read+0x120/0x120 [ 1902.343131] ? init_wait_entry+0x1c0/0x1c0 [ 1902.347381] ? prealloc_shrinker+0xe5/0x330 [ 1902.351729] sget_userns+0x9c9/0xf10 [ 1902.355449] ? get_anon_bdev+0xc0/0xc0 [ 1902.359379] ? grab_super+0x400/0x400 [ 1902.363199] ? selinux_ipv4_output+0x50/0x50 [ 1902.367633] ? __free_pages+0x103/0x190 [ 1902.371622] ? selinux_sb_copy_data+0x602/0x740 [ 1902.376297] ? mark_held_locks+0xc7/0x130 [ 1902.380466] ? selinux_capable+0x36/0x40 [ 1902.384541] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1902.390089] ? security_capable+0x99/0xc0 [ 1902.394250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1902.399801] ? ns_capable_common+0x13f/0x170 [ 1902.404235] ? get_anon_bdev+0xc0/0xc0 [ 1902.408129] sget+0x10b/0x150 [ 1902.411254] ? ovl_show_options+0x550/0x550 [ 1902.415588] mount_nodev+0x33/0x110 [ 1902.419233] ovl_mount+0x2c/0x40 [ 1902.422615] mount_fs+0xae/0x31d [ 1902.426005] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1902.430602] ? may_umount+0xb0/0xb0 [ 1902.434250] ? _raw_read_unlock+0x2c/0x50 [ 1902.438412] ? __get_fs_type+0x97/0xc0 [ 1902.442318] do_mount+0x581/0x31f0 [ 1902.445873] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1902.451333] ? trace_hardirqs_on+0x310/0x310 [ 1902.455755] ? copy_mount_string+0x40/0x40 [ 1902.460004] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1902.464781] ? retint_kernel+0x2d/0x2d [ 1902.468691] ? copy_mount_options+0x228/0x430 [ 1902.473198] ? write_comp_data+0x70/0x70 [ 1902.477413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1902.482970] ? copy_mount_options+0x315/0x430 [ 1902.487620] ksys_mount+0x12d/0x140 [ 1902.491266] __x64_sys_mount+0xbe/0x150 [ 1902.495254] do_syscall_64+0x1b9/0x820 [ 1902.499150] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1902.504525] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1902.509464] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1902.514329] ? trace_hardirqs_on_caller+0x310/0x310 [ 1902.519355] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1902.524403] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1902.529437] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1902.534634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1902.539832] RIP: 0033:0x457569 [ 1902.543044] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1902.561949] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:55:36 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0xff3f]}}]}, 0x80}}, 0x0) 03:55:36 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x3f000000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1902.569664] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1902.576941] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1902.584215] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1902.591488] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1902.598764] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:36 executing program 5 (fault-call:2 fault-nth:16): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xc77}, 0x28) 03:55:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}}, 0x1c) close(r1) 03:55:36 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x14d9}, 0x28) 03:55:36 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x3f00000000000000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:36 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x500]}}]}, 0x80}}, 0x0) [ 1902.792402] FAULT_INJECTION: forcing a failure. [ 1902.792402] name failslab, interval 1, probability 0, space 0, times 0 [ 1902.845499] CPU: 0 PID: 11965 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1902.852467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1902.861824] Call Trace: [ 1902.864434] dump_stack+0x244/0x39d [ 1902.868086] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1902.873292] ? debug_smp_processor_id+0x1c/0x20 [ 1902.877971] ? perf_trace_lock+0x14d/0x7a0 [ 1902.882224] should_fail.cold.4+0xa/0x17 [ 1902.886302] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1902.891421] ? radix_tree_descend+0x2e0/0x2e0 [ 1902.895926] ? __radix_tree_lookup+0x358/0x4c0 [ 1902.900522] ? find_held_lock+0x36/0x1c0 [ 1902.904591] ? zap_class+0x640/0x640 [ 1902.908327] ? find_held_lock+0x36/0x1c0 [ 1902.912407] ? __lock_is_held+0xb5/0x140 [ 1902.916504] ? perf_trace_sched_process_exec+0x860/0x860 [ 1902.921970] ? down_write_nested+0x130/0x130 [ 1902.926391] ? down_read+0x120/0x120 [ 1902.930131] __should_failslab+0x124/0x180 [ 1902.934382] ? ovl_show_options+0x550/0x550 [ 1902.938716] should_failslab+0x9/0x14 [ 1902.942529] kmem_cache_alloc_trace+0x2d7/0x750 [ 1902.947206] ? memcpy+0x45/0x50 [ 1902.950506] ? ovl_show_options+0x550/0x550 [ 1902.954842] ovl_fill_super+0x135/0x3f7b [ 1902.958944] ? grab_super+0x400/0x400 [ 1902.962775] ? selinux_ipv4_output+0x50/0x50 [ 1902.967202] ? ovl_show_options+0x550/0x550 [ 1902.972019] ? __free_pages+0x103/0x190 [ 1902.976006] ? selinux_sb_copy_data+0x602/0x740 [ 1902.980703] ? selinux_capable+0x36/0x40 [ 1902.984785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1902.990337] ? security_capable+0x99/0xc0 [ 1902.994502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1903.000048] ? ns_capable_common+0x13f/0x170 [ 1903.004474] ? get_anon_bdev+0xc0/0xc0 [ 1903.008371] ? sget+0x113/0x150 [ 1903.011666] ? ovl_show_options+0x550/0x550 [ 1903.016012] mount_nodev+0x6b/0x110 [ 1903.019652] ovl_mount+0x2c/0x40 [ 1903.023033] mount_fs+0xae/0x31d [ 1903.026424] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1903.031024] ? may_umount+0xb0/0xb0 [ 1903.034663] ? _raw_read_unlock+0x2c/0x50 [ 1903.038820] ? __get_fs_type+0x97/0xc0 [ 1903.042736] do_mount+0x581/0x31f0 [ 1903.046282] ? check_preemption_disabled+0x48/0x280 [ 1903.051316] ? copy_mount_string+0x40/0x40 [ 1903.055577] ? copy_mount_options+0x5f/0x430 [ 1903.059996] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1903.065021] ? kmem_cache_alloc_trace+0x353/0x750 [ 1903.069889] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1903.075450] ? _copy_from_user+0xdf/0x150 [ 1903.079618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1903.085156] ? copy_mount_options+0x315/0x430 [ 1903.089698] ksys_mount+0x12d/0x140 [ 1903.093335] __x64_sys_mount+0xbe/0x150 [ 1903.097325] do_syscall_64+0x1b9/0x820 [ 1903.101234] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1903.106619] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1903.111557] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1903.116424] ? trace_hardirqs_on_caller+0x310/0x310 [ 1903.121460] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1903.126484] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1903.131544] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1903.136405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1903.141619] RIP: 0033:0x457569 [ 1903.144824] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1903.163742] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1903.171457] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1903.178726] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1903.185996] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 03:55:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1512}, 0x28) [ 1903.193278] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1903.200559] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:36 executing program 5 (fault-call:2 fault-nth:17): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:36 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x6f1}, 0x28) 03:55:36 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x8000a0ffffffff]}}]}, 0x80}}, 0x0) 03:55:36 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x932}, 0x28) 03:55:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xeb6}, 0x28) 03:55:36 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x100000000000000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1903.362486] FAULT_INJECTION: forcing a failure. [ 1903.362486] name failslab, interval 1, probability 0, space 0, times 0 [ 1903.420890] CPU: 0 PID: 11984 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1903.427892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1903.437263] Call Trace: [ 1903.439910] dump_stack+0x244/0x39d [ 1903.443575] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1903.448790] ? debug_smp_processor_id+0x1c/0x20 [ 1903.453472] ? perf_trace_lock+0x14d/0x7a0 [ 1903.457721] should_fail.cold.4+0xa/0x17 [ 1903.461799] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1903.466930] ? zap_class+0x640/0x640 [ 1903.470650] ? save_stack+0xa9/0xd0 [ 1903.474281] ? save_stack+0x43/0xd0 [ 1903.477916] ? kasan_kmalloc+0xc7/0xe0 [ 1903.481806] ? __kmalloc+0x14e/0x760 [ 1903.485603] ? find_held_lock+0x36/0x1c0 [ 1903.489700] ? __lock_is_held+0xb5/0x140 [ 1903.493789] ? perf_trace_sched_process_exec+0x860/0x860 [ 1903.499245] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1903.504800] ? check_preemption_disabled+0x48/0x280 [ 1903.509865] __should_failslab+0x124/0x180 [ 1903.514118] should_failslab+0x9/0x14 [ 1903.517930] kmem_cache_alloc_node_trace+0x270/0x740 [ 1903.523056] __kmalloc_node+0x33/0x70 [ 1903.526906] kvmalloc_node+0x65/0xf0 [ 1903.530688] __list_lru_init+0x5d9/0x840 [ 1903.534766] ? list_lru_destroy+0x500/0x500 [ 1903.539102] ? up_write+0x7b/0x220 [ 1903.542652] ? down_read+0x120/0x120 [ 1903.546373] ? init_wait_entry+0x1c0/0x1c0 [ 1903.550609] ? prealloc_shrinker+0xe5/0x330 [ 1903.555669] sget_userns+0x9c9/0xf10 [ 1903.559389] ? get_anon_bdev+0xc0/0xc0 [ 1903.563311] ? grab_super+0x400/0x400 [ 1903.567125] ? selinux_ipv4_output+0x50/0x50 [ 1903.571547] ? __free_pages+0x103/0x190 [ 1903.575531] ? selinux_sb_copy_data+0x602/0x740 [ 1903.580217] ? selinux_capable+0x36/0x40 [ 1903.584285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1903.589833] ? security_capable+0x99/0xc0 [ 1903.594005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1903.599553] ? ns_capable_common+0x13f/0x170 [ 1903.603970] ? get_anon_bdev+0xc0/0xc0 [ 1903.607880] sget+0x10b/0x150 [ 1903.611009] ? ovl_show_options+0x550/0x550 [ 1903.615344] mount_nodev+0x33/0x110 [ 1903.618984] ovl_mount+0x2c/0x40 [ 1903.622360] mount_fs+0xae/0x31d [ 1903.625744] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1903.630336] ? may_umount+0xb0/0xb0 [ 1903.633969] ? _raw_read_unlock+0x2c/0x50 [ 1903.638121] ? __get_fs_type+0x97/0xc0 [ 1903.642027] do_mount+0x581/0x31f0 [ 1903.645587] ? check_preemption_disabled+0x48/0x280 [ 1903.650619] ? copy_mount_string+0x40/0x40 [ 1903.654893] ? copy_mount_options+0x5f/0x430 [ 1903.659312] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1903.664334] ? kmem_cache_alloc_trace+0x353/0x750 [ 1903.669186] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1903.674733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1903.680274] ? copy_mount_options+0x315/0x430 [ 1903.684781] ksys_mount+0x12d/0x140 [ 1903.688438] __x64_sys_mount+0xbe/0x150 [ 1903.692430] do_syscall_64+0x1b9/0x820 [ 1903.696336] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1903.701707] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1903.706640] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1903.711490] ? trace_hardirqs_on_caller+0x310/0x310 [ 1903.716513] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1903.721536] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1903.726569] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1903.731429] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1903.736621] RIP: 0033:0x457569 [ 1903.739822] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1903.758735] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1903.766468] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1903.773740] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1903.781015] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1903.788286] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1903.795569] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:37 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x116f}, 0x28) 03:55:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3075000000000000]}}, 0x1c) close(r1) 03:55:37 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x2000000000000000]}}]}, 0x80}}, 0x0) 03:55:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xbe1}, 0x28) 03:55:37 executing program 5 (fault-call:2 fault-nth:18): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:37 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x20000000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1903.991388] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:37 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x561}, 0x28) [ 1904.050336] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:37 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x2000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1904.094960] FAULT_INJECTION: forcing a failure. [ 1904.094960] name failslab, interval 1, probability 0, space 0, times 0 [ 1904.145050] CPU: 0 PID: 12021 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1904.152010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1904.161374] Call Trace: [ 1904.163994] dump_stack+0x244/0x39d [ 1904.167660] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1904.172907] ? debug_smp_processor_id+0x1c/0x20 [ 1904.177611] ? perf_trace_lock+0x14d/0x7a0 [ 1904.181899] should_fail.cold.4+0xa/0x17 [ 1904.185991] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1904.191116] ? zap_class+0x640/0x640 [ 1904.194885] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1904.200450] ? check_preemption_disabled+0x48/0x280 [ 1904.205487] ? zap_class+0x640/0x640 [ 1904.209239] ? find_held_lock+0x36/0x1c0 [ 1904.213341] ? __lock_is_held+0xb5/0x140 [ 1904.217459] ? perf_trace_sched_process_exec+0x860/0x860 [ 1904.222958] __should_failslab+0x124/0x180 [ 1904.227217] should_failslab+0x9/0x14 [ 1904.231039] __kmalloc_track_caller+0x2d0/0x750 [ 1904.231610] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1904.235726] ? ovl_fill_super+0x135/0x3f7b [ 1904.235745] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1904.235764] ? kmem_cache_alloc_trace+0x353/0x750 [ 1904.235785] ? ovl_fill_super+0x29b/0x3f7b [ 1904.235808] kstrdup+0x39/0x70 [ 1904.235827] ? ovl_show_options+0x550/0x550 [ 1904.235860] ovl_fill_super+0x29b/0x3f7b [ 1904.276085] ? selinux_ipv4_output+0x50/0x50 [ 1904.280512] ? ovl_show_options+0x550/0x550 [ 1904.284842] ? __free_pages+0x103/0x190 [ 1904.288844] ? selinux_sb_copy_data+0x602/0x740 [ 1904.293553] ? selinux_capable+0x36/0x40 [ 1904.297631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1904.303184] ? security_capable+0x99/0xc0 [ 1904.307343] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1904.312897] ? ns_capable_common+0x13f/0x170 [ 1904.317338] ? get_anon_bdev+0xc0/0xc0 [ 1904.321248] ? sget+0x113/0x150 [ 1904.324539] ? ovl_show_options+0x550/0x550 [ 1904.328885] mount_nodev+0x6b/0x110 [ 1904.332525] ovl_mount+0x2c/0x40 [ 1904.335938] mount_fs+0xae/0x31d [ 1904.339337] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1904.343934] ? may_umount+0xb0/0xb0 [ 1904.347571] ? _raw_read_unlock+0x2c/0x50 [ 1904.351726] ? __get_fs_type+0x97/0xc0 [ 1904.355660] do_mount+0x581/0x31f0 [ 1904.359207] ? check_preemption_disabled+0x48/0x280 [ 1904.364239] ? copy_mount_string+0x40/0x40 [ 1904.368500] ? copy_mount_options+0x5f/0x430 [ 1904.372920] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1904.377961] ? kmem_cache_alloc_trace+0x353/0x750 [ 1904.382823] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1904.388378] ? _copy_from_user+0xdf/0x150 [ 1904.392560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1904.398110] ? copy_mount_options+0x315/0x430 [ 1904.402621] ksys_mount+0x12d/0x140 [ 1904.406265] __x64_sys_mount+0xbe/0x150 [ 1904.410256] do_syscall_64+0x1b9/0x820 [ 1904.414167] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1904.419543] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1904.424474] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1904.429321] ? trace_hardirqs_on_caller+0x310/0x310 [ 1904.434353] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1904.439382] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1904.444430] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1904.449336] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1904.454530] RIP: 0033:0x457569 [ 1904.457732] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1904.476638] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1904.484360] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 03:55:37 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x3f00000000000000]}}]}, 0x80}}, 0x0) 03:55:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000]}}, 0x1c) close(r1) 03:55:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x19}, 0x28) [ 1904.491652] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1904.498953] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1904.506226] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1904.513937] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:38 executing program 5 (fault-call:2 fault-nth:19): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 1904.547297] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, 0x1c) close(r1) 03:55:38 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x17d}, 0x28) 03:55:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1273}, 0x28) 03:55:38 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0xff3f0000]}}]}, 0x80}}, 0x0) [ 1904.698742] FAULT_INJECTION: forcing a failure. [ 1904.698742] name failslab, interval 1, probability 0, space 0, times 0 [ 1904.722320] CPU: 0 PID: 12045 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1904.729356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1904.738720] Call Trace: [ 1904.741339] dump_stack+0x244/0x39d [ 1904.745004] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1904.750231] ? debug_smp_processor_id+0x1c/0x20 [ 1904.754952] ? perf_trace_lock+0x14d/0x7a0 [ 1904.759261] should_fail.cold.4+0xa/0x17 [ 1904.763350] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1904.768485] ? zap_class+0x640/0x640 [ 1904.772215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1904.777760] ? check_preemption_disabled+0x48/0x280 [ 1904.782791] ? zap_class+0x640/0x640 [ 1904.786527] ? find_held_lock+0x36/0x1c0 [ 1904.790606] ? __lock_is_held+0xb5/0x140 [ 1904.794777] ? ttm_page_alloc_init.cold.19+0x7e9/0xf47 [ 1904.800101] ? perf_trace_sched_process_exec+0x860/0x860 [ 1904.805596] __should_failslab+0x124/0x180 [ 1904.809862] should_failslab+0x9/0x14 [ 1904.813691] __kmalloc_track_caller+0x2d0/0x750 [ 1904.818368] ? ovl_fill_super+0x135/0x3f7b [ 1904.822612] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1904.827637] ? kmem_cache_alloc_trace+0x353/0x750 [ 1904.832491] ? ovl_fill_super+0x29b/0x3f7b [ 1904.836740] kstrdup+0x39/0x70 [ 1904.839965] ? ovl_show_options+0x550/0x550 [ 1904.844298] ovl_fill_super+0x29b/0x3f7b [ 1904.848391] ? selinux_ipv4_output+0x50/0x50 [ 1904.852829] ? ovl_show_options+0x550/0x550 [ 1904.857168] ? __free_pages+0x103/0x190 [ 1904.861151] ? selinux_sb_copy_data+0x602/0x740 [ 1904.865843] ? selinux_capable+0x36/0x40 [ 1904.869934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1904.875494] ? security_capable+0x99/0xc0 [ 1904.879653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1904.885204] ? ns_capable_common+0x13f/0x170 [ 1904.889631] ? get_anon_bdev+0xc0/0xc0 [ 1904.893529] ? sget+0x113/0x150 [ 1904.896827] ? ovl_show_options+0x550/0x550 [ 1904.901170] mount_nodev+0x6b/0x110 [ 1904.904811] ovl_mount+0x2c/0x40 [ 1904.908202] mount_fs+0xae/0x31d [ 1904.911591] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1904.916190] ? may_umount+0xb0/0xb0 [ 1904.919829] ? _raw_read_unlock+0x2c/0x50 [ 1904.924002] ? __get_fs_type+0x97/0xc0 [ 1904.927910] do_mount+0x581/0x31f0 [ 1904.931467] ? check_preemption_disabled+0x48/0x280 [ 1904.936502] ? copy_mount_string+0x40/0x40 [ 1904.940761] ? copy_mount_options+0x5f/0x430 [ 1904.945177] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1904.950204] ? kmem_cache_alloc_trace+0x353/0x750 [ 1904.955060] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1904.960604] ? _copy_from_user+0xdf/0x150 [ 1904.964795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1904.970788] ? copy_mount_options+0x315/0x430 [ 1904.975304] ksys_mount+0x12d/0x140 [ 1904.978977] __x64_sys_mount+0xbe/0x150 [ 1904.982971] do_syscall_64+0x1b9/0x820 [ 1904.986895] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1904.992273] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1904.997209] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1905.002063] ? trace_hardirqs_on_caller+0x310/0x310 [ 1905.007088] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1905.012114] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1905.017151] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1905.022014] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1905.027212] RIP: 0033:0x457569 [ 1905.030420] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:55:38 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x34000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1905.049328] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1905.057046] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1905.064322] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1905.071599] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1905.078885] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1905.086157] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:38 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1dc}, 0x28) [ 1905.104262] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}}, 0x1c) close(r1) 03:55:38 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x400000000000000]}}]}, 0x80}}, 0x0) 03:55:38 executing program 5 (fault-call:2 fault-nth:20): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x91b}, 0x28) 03:55:38 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x250}, 0x28) 03:55:38 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xffffff7f00000000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:38 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x200000000000000]}}]}, 0x80}}, 0x0) [ 1905.354805] FAULT_INJECTION: forcing a failure. [ 1905.354805] name failslab, interval 1, probability 0, space 0, times 0 [ 1905.408675] CPU: 0 PID: 12077 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1905.415663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1905.425019] Call Trace: [ 1905.427621] dump_stack+0x244/0x39d [ 1905.431268] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1905.436475] ? debug_smp_processor_id+0x1c/0x20 [ 1905.441153] ? perf_trace_lock+0x14d/0x7a0 [ 1905.445410] should_fail.cold.4+0xa/0x17 [ 1905.449490] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1905.454601] ? zap_class+0x640/0x640 [ 1905.458329] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1905.463890] ? check_preemption_disabled+0x48/0x280 [ 1905.468920] ? zap_class+0x640/0x640 [ 1905.472655] ? find_held_lock+0x36/0x1c0 [ 1905.476728] ? __lock_is_held+0xb5/0x140 [ 1905.480819] ? perf_trace_sched_process_exec+0x860/0x860 [ 1905.486309] __should_failslab+0x124/0x180 [ 1905.490555] should_failslab+0x9/0x14 [ 1905.494365] __kmalloc_track_caller+0x2d0/0x750 [ 1905.499045] ? ovl_fill_super+0x135/0x3f7b [ 1905.503287] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1905.508313] ? kmem_cache_alloc_trace+0x353/0x750 [ 1905.513172] ? ovl_fill_super+0x29b/0x3f7b [ 1905.517427] kstrdup+0x39/0x70 [ 1905.520633] ? ovl_show_options+0x550/0x550 [ 1905.524964] ovl_fill_super+0x29b/0x3f7b [ 1905.529066] ? selinux_ipv4_output+0x50/0x50 [ 1905.533496] ? ovl_show_options+0x550/0x550 [ 1905.537827] ? __free_pages+0x103/0x190 [ 1905.541824] ? selinux_sb_copy_data+0x602/0x740 [ 1905.546526] ? selinux_capable+0x36/0x40 [ 1905.550603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1905.556151] ? security_capable+0x99/0xc0 [ 1905.560332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1905.565888] ? ns_capable_common+0x13f/0x170 [ 1905.570311] ? get_anon_bdev+0xc0/0xc0 [ 1905.574214] ? sget+0x113/0x150 [ 1905.577508] ? ovl_show_options+0x550/0x550 [ 1905.581844] mount_nodev+0x6b/0x110 [ 1905.585504] ovl_mount+0x2c/0x40 [ 1905.588912] mount_fs+0xae/0x31d [ 1905.592297] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1905.596898] ? may_umount+0xb0/0xb0 [ 1905.600540] ? _raw_read_unlock+0x2c/0x50 [ 1905.604693] ? __get_fs_type+0x97/0xc0 [ 1905.608598] do_mount+0x581/0x31f0 [ 1905.612146] ? check_preemption_disabled+0x48/0x280 [ 1905.617195] ? copy_mount_string+0x40/0x40 [ 1905.621458] ? copy_mount_options+0x5f/0x430 [ 1905.625889] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1905.630943] ? kmem_cache_alloc_trace+0x353/0x750 [ 1905.635801] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1905.641358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1905.646909] ? copy_mount_options+0x315/0x430 [ 1905.651431] ksys_mount+0x12d/0x140 [ 1905.655076] __x64_sys_mount+0xbe/0x150 [ 1905.659068] do_syscall_64+0x1b9/0x820 [ 1905.662966] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1905.668341] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1905.673283] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1905.678136] ? trace_hardirqs_on_caller+0x310/0x310 [ 1905.683164] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1905.688195] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1905.693226] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1905.698093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1905.703289] RIP: 0033:0x457569 [ 1905.706492] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1905.725408] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1905.733128] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1905.740406] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1905.747678] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 03:55:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x47a}, 0x28) [ 1905.754951] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1905.762228] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:39 executing program 5 (fault-call:2 fault-nth:21): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x13ae}, 0x28) 03:55:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x11d0}, 0x28) 03:55:39 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x1a0ffffffff, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1905.963266] FAULT_INJECTION: forcing a failure. [ 1905.963266] name failslab, interval 1, probability 0, space 0, times 0 [ 1905.980913] CPU: 0 PID: 12099 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1905.987890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1905.997262] Call Trace: [ 1905.999893] dump_stack+0x244/0x39d [ 1906.003549] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1906.008756] ? debug_smp_processor_id+0x1c/0x20 [ 1906.013433] ? perf_trace_lock+0x14d/0x7a0 [ 1906.017689] should_fail.cold.4+0xa/0x17 [ 1906.021769] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1906.026906] ? save_stack+0x43/0xd0 [ 1906.030541] ? kasan_kmalloc+0xc7/0xe0 [ 1906.034431] ? __kmalloc+0x14e/0x760 [ 1906.038228] ? match_strdup+0x5e/0xa0 [ 1906.042042] ? ovl_fill_super+0x45d/0x3f7b [ 1906.046288] ? zap_class+0x640/0x640 [ 1906.050009] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 1906.054811] ? ksys_mount+0x12d/0x140 [ 1906.058644] ? __x64_sys_mount+0xbe/0x150 [ 1906.062804] ? do_syscall_64+0x1b9/0x820 [ 1906.066892] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1906.072277] ? find_held_lock+0x36/0x1c0 [ 1906.076556] ? __lock_is_held+0xb5/0x140 [ 1906.080642] ? zap_class+0x640/0x640 [ 1906.084366] ? perf_trace_sched_process_exec+0x860/0x860 [ 1906.089832] ? check_preemption_disabled+0x48/0x280 [ 1906.094894] __should_failslab+0x124/0x180 [ 1906.099143] should_failslab+0x9/0x14 [ 1906.102950] __kmalloc+0x2d4/0x760 [ 1906.106504] ? match_strdup+0x5e/0xa0 [ 1906.110321] match_strdup+0x5e/0xa0 [ 1906.113967] ovl_fill_super+0x16b7/0x3f7b [ 1906.118150] ? ovl_show_options+0x550/0x550 [ 1906.122477] ? __free_pages+0x103/0x190 [ 1906.126463] ? selinux_sb_copy_data+0x602/0x740 [ 1906.131155] ? selinux_capable+0x36/0x40 [ 1906.135228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1906.140776] ? security_capable+0x99/0xc0 [ 1906.144938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1906.150490] ? get_anon_bdev+0xc0/0xc0 [ 1906.154387] ? sget+0x113/0x150 [ 1906.157695] ? ovl_show_options+0x550/0x550 [ 1906.162027] mount_nodev+0x6b/0x110 [ 1906.165669] ovl_mount+0x2c/0x40 [ 1906.169050] mount_fs+0xae/0x31d [ 1906.172439] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1906.177036] ? may_umount+0xb0/0xb0 [ 1906.180675] ? _raw_read_unlock+0x2c/0x50 [ 1906.184829] ? __get_fs_type+0x97/0xc0 [ 1906.188752] do_mount+0x581/0x31f0 [ 1906.192300] ? check_preemption_disabled+0x48/0x280 [ 1906.197338] ? copy_mount_string+0x40/0x40 [ 1906.201599] ? copy_mount_options+0x5f/0x430 [ 1906.206016] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1906.211041] ? kmem_cache_alloc_trace+0x353/0x750 [ 1906.215907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1906.221455] ? _copy_from_user+0xdf/0x150 [ 1906.225616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1906.231165] ? copy_mount_options+0x315/0x430 [ 1906.235678] ksys_mount+0x12d/0x140 [ 1906.239322] __x64_sys_mount+0xbe/0x150 [ 1906.243309] do_syscall_64+0x1b9/0x820 [ 1906.247207] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1906.252582] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1906.257524] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1906.262382] ? trace_hardirqs_on_caller+0x310/0x310 [ 1906.267409] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1906.272441] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1906.277480] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1906.282345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1906.287548] RIP: 0033:0x457569 [ 1906.290760] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1906.309677] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1906.317398] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1906.324670] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1906.331943] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1906.339262] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1906.346539] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdca4655]}}, 0x1c) close(r1) 03:55:39 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0xffffff7f00000000]}}]}, 0x80}}, 0x0) 03:55:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x118a}, 0x28) 03:55:39 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xa0010000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:39 executing program 5 (fault-call:2 fault-nth:22): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xe99}, 0x28) 03:55:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x209}, 0x28) 03:55:40 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0xa0010000]}}]}, 0x80}}, 0x0) [ 1906.561483] FAULT_INJECTION: forcing a failure. [ 1906.561483] name failslab, interval 1, probability 0, space 0, times 0 [ 1906.598373] CPU: 0 PID: 12123 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1906.605342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1906.614710] Call Trace: [ 1906.617327] dump_stack+0x244/0x39d [ 1906.620987] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1906.626207] ? debug_smp_processor_id+0x1c/0x20 [ 1906.630908] ? perf_trace_lock+0x14d/0x7a0 [ 1906.635176] should_fail.cold.4+0xa/0x17 [ 1906.639270] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1906.644409] ? zap_class+0x640/0x640 [ 1906.648151] ? kasan_kmalloc+0xc7/0xe0 [ 1906.652052] ? __kmalloc+0x14e/0x760 [ 1906.655790] ? match_strdup+0x5e/0xa0 [ 1906.659620] ? ovl_fill_super+0x1662/0x3f7b [ 1906.663950] ? mount_nodev+0x6b/0x110 [ 1906.667769] ? find_held_lock+0x36/0x1c0 [ 1906.671854] ? __lock_is_held+0xb5/0x140 [ 1906.675954] ? perf_trace_sched_process_exec+0x860/0x860 [ 1906.681436] __should_failslab+0x124/0x180 [ 1906.685710] should_failslab+0x9/0x14 [ 1906.689520] __kmalloc_track_caller+0x2d0/0x750 [ 1906.694201] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1906.699225] ? __kmalloc+0x5e4/0x760 [ 1906.702965] ? ovl_mount_dir+0x2a/0x1c0 [ 1906.706983] kstrdup+0x39/0x70 [ 1906.710211] ovl_mount_dir+0x2a/0x1c0 [ 1906.714032] ovl_fill_super+0x994/0x3f7b [ 1906.718128] ? ovl_show_options+0x550/0x550 [ 1906.722461] ? __free_pages+0x103/0x190 [ 1906.726445] ? selinux_sb_copy_data+0x602/0x740 [ 1906.731153] ? selinux_capable+0x36/0x40 [ 1906.735229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1906.740774] ? security_capable+0x99/0xc0 [ 1906.744933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1906.750490] ? get_anon_bdev+0xc0/0xc0 [ 1906.754391] ? sget+0x113/0x150 [ 1906.757686] ? ovl_show_options+0x550/0x550 [ 1906.762022] mount_nodev+0x6b/0x110 [ 1906.765666] ovl_mount+0x2c/0x40 [ 1906.769069] mount_fs+0xae/0x31d [ 1906.772472] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1906.777075] ? may_umount+0xb0/0xb0 [ 1906.780732] ? _raw_read_unlock+0x2c/0x50 [ 1906.784897] ? __get_fs_type+0x97/0xc0 [ 1906.788804] do_mount+0x581/0x31f0 [ 1906.792350] ? check_preemption_disabled+0x48/0x280 [ 1906.797385] ? copy_mount_string+0x40/0x40 [ 1906.801647] ? copy_mount_options+0x5f/0x430 [ 1906.806062] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1906.811089] ? kmem_cache_alloc_trace+0x353/0x750 [ 1906.815945] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1906.821492] ? _copy_from_user+0xdf/0x150 [ 1906.825653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1906.831202] ? copy_mount_options+0x315/0x430 [ 1906.835713] ksys_mount+0x12d/0x140 [ 1906.839352] __x64_sys_mount+0xbe/0x150 [ 1906.843345] do_syscall_64+0x1b9/0x820 [ 1906.847245] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1906.852620] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1906.857557] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1906.862411] ? trace_hardirqs_on_caller+0x310/0x310 [ 1906.867441] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1906.872474] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1906.877519] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1906.882389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1906.887586] RIP: 0033:0x457569 [ 1906.890786] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:55:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xba7}, 0x28) 03:55:40 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1176}, 0x28) 03:55:40 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x8000a0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1906.909703] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1906.917427] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1906.924701] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1906.931975] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1906.939253] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1906.946526] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x144e}, 0x28) 03:55:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) close(r1) 03:55:40 executing program 5 (fault-call:2 fault-nth:23): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:40 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x253}, 0x28) 03:55:40 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x400300]}}]}, 0x80}}, 0x0) 03:55:40 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x3f00, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x925}, 0x28) 03:55:40 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1014}, 0x28) 03:55:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x10ea}, 0x28) [ 1907.429653] FAULT_INJECTION: forcing a failure. [ 1907.429653] name failslab, interval 1, probability 0, space 0, times 0 [ 1907.460709] CPU: 0 PID: 12163 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1907.467689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1907.477058] Call Trace: [ 1907.479675] dump_stack+0x244/0x39d [ 1907.483335] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1907.488557] ? debug_smp_processor_id+0x1c/0x20 [ 1907.493269] ? perf_trace_lock+0x14d/0x7a0 [ 1907.497541] should_fail.cold.4+0xa/0x17 [ 1907.501630] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1907.506754] ? save_stack+0x43/0xd0 [ 1907.510390] ? kasan_kmalloc+0xc7/0xe0 [ 1907.514280] ? __kmalloc+0x14e/0x760 [ 1907.518017] ? match_strdup+0x5e/0xa0 [ 1907.521828] ? ovl_fill_super+0x16b7/0x3f7b [ 1907.526162] ? zap_class+0x640/0x640 [ 1907.529898] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 1907.534659] ? ksys_mount+0x12d/0x140 [ 1907.538464] ? __x64_sys_mount+0xbe/0x150 [ 1907.542618] ? do_syscall_64+0x1b9/0x820 [ 1907.546688] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1907.552064] ? find_held_lock+0x36/0x1c0 [ 1907.556136] ? __lock_is_held+0xb5/0x140 [ 1907.560217] ? zap_class+0x640/0x640 [ 1907.563939] ? perf_trace_sched_process_exec+0x860/0x860 [ 1907.569406] ? check_preemption_disabled+0x48/0x280 [ 1907.574443] __should_failslab+0x124/0x180 [ 1907.578688] should_failslab+0x9/0x14 [ 1907.582492] __kmalloc+0x2d4/0x760 [ 1907.586045] ? match_strdup+0x5e/0xa0 [ 1907.589866] match_strdup+0x5e/0xa0 [ 1907.593517] ovl_fill_super+0x1662/0x3f7b [ 1907.597699] ? ovl_show_options+0x550/0x550 [ 1907.602028] ? __free_pages+0x103/0x190 [ 1907.606008] ? selinux_sb_copy_data+0x602/0x740 [ 1907.610700] ? selinux_capable+0x36/0x40 [ 1907.614770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1907.620318] ? security_capable+0x99/0xc0 [ 1907.624489] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1907.630039] ? get_anon_bdev+0xc0/0xc0 [ 1907.633935] ? sget+0x113/0x150 [ 1907.637276] ? ovl_show_options+0x550/0x550 [ 1907.641643] mount_nodev+0x6b/0x110 [ 1907.645277] ovl_mount+0x2c/0x40 [ 1907.648657] mount_fs+0xae/0x31d [ 1907.652042] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1907.656634] ? may_umount+0xb0/0xb0 [ 1907.660270] ? _raw_read_unlock+0x2c/0x50 [ 1907.664424] ? __get_fs_type+0x97/0xc0 [ 1907.668331] do_mount+0x581/0x31f0 [ 1907.671891] ? check_preemption_disabled+0x48/0x280 [ 1907.676927] ? copy_mount_string+0x40/0x40 [ 1907.681195] ? copy_mount_options+0x5f/0x430 [ 1907.685613] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1907.690636] ? kmem_cache_alloc_trace+0x353/0x750 [ 1907.695487] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1907.701039] ? _copy_from_user+0xdf/0x150 [ 1907.705202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1907.710745] ? copy_mount_options+0x315/0x430 [ 1907.715254] ksys_mount+0x12d/0x140 [ 1907.718923] __x64_sys_mount+0xbe/0x150 [ 1907.722917] do_syscall_64+0x1b9/0x820 [ 1907.726818] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1907.732216] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1907.737151] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1907.742019] ? trace_hardirqs_on_caller+0x310/0x310 [ 1907.747046] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1907.752070] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1907.757105] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1907.761971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1907.767189] RIP: 0033:0x457569 [ 1907.770391] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1907.789294] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1907.797013] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1907.804286] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1907.811563] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1907.818842] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 03:55:40 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:41 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x4]}}]}, 0x80}}, 0x0) [ 1907.826135] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x129f}, 0x28) 03:55:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xcc2}, 0x28) 03:55:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ba71664]}}, 0x1c) close(r1) 03:55:41 executing program 5 (fault-call:2 fault-nth:24): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:41 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x200000000000000, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:41 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0xf00000000000000]}}]}, 0x80}}, 0x0) 03:55:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x2a0}, 0x28) 03:55:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x84d}, 0x28) 03:55:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xbcb}, 0x28) [ 1908.289412] FAULT_INJECTION: forcing a failure. [ 1908.289412] name failslab, interval 1, probability 0, space 0, times 0 [ 1908.309462] CPU: 1 PID: 12204 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1908.316427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1908.325949] Call Trace: [ 1908.328564] dump_stack+0x244/0x39d [ 1908.332221] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1908.337445] ? debug_smp_processor_id+0x1c/0x20 [ 1908.342135] ? perf_trace_lock+0x14d/0x7a0 [ 1908.346394] should_fail.cold.4+0xa/0x17 [ 1908.350473] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1908.355599] ? zap_class+0x640/0x640 [ 1908.359321] ? save_stack+0xa9/0xd0 [ 1908.362979] ? save_stack+0x43/0xd0 [ 1908.366618] ? kasan_kmalloc+0xc7/0xe0 [ 1908.370522] ? __kmalloc_track_caller+0x14a/0x750 [ 1908.375370] ? find_held_lock+0x36/0x1c0 [ 1908.379448] ? __lock_is_held+0xb5/0x140 [ 1908.383541] ? perf_trace_sched_process_exec+0x860/0x860 [ 1908.388999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1908.394546] ? check_preemption_disabled+0x48/0x280 [ 1908.399582] __should_failslab+0x124/0x180 [ 1908.403838] should_failslab+0x9/0x14 [ 1908.407660] kmem_cache_alloc+0x2be/0x730 [ 1908.411834] getname_kernel+0x54/0x370 [ 1908.415742] kern_path+0x1e/0x40 [ 1908.419122] ovl_mount_dir_noesc+0x6b/0x190 [ 1908.423479] ovl_mount_dir+0x10a/0x1c0 [ 1908.427387] ovl_fill_super+0x994/0x3f7b [ 1908.431483] ? ovl_show_options+0x550/0x550 [ 1908.435809] ? __free_pages+0x103/0x190 [ 1908.439797] ? selinux_sb_copy_data+0x602/0x740 [ 1908.444490] ? selinux_capable+0x36/0x40 [ 1908.448563] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1908.454108] ? security_capable+0x99/0xc0 [ 1908.458278] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1908.463833] ? get_anon_bdev+0xc0/0xc0 [ 1908.467740] ? sget+0x113/0x150 [ 1908.471038] ? ovl_show_options+0x550/0x550 [ 1908.475371] mount_nodev+0x6b/0x110 [ 1908.479016] ovl_mount+0x2c/0x40 [ 1908.482399] mount_fs+0xae/0x31d [ 1908.485782] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1908.490381] ? may_umount+0xb0/0xb0 [ 1908.494015] ? _raw_read_unlock+0x2c/0x50 [ 1908.498169] ? __get_fs_type+0x97/0xc0 [ 1908.502076] do_mount+0x581/0x31f0 [ 1908.505622] ? check_preemption_disabled+0x48/0x280 [ 1908.510661] ? copy_mount_string+0x40/0x40 [ 1908.514923] ? copy_mount_options+0x5f/0x430 [ 1908.519339] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1908.524366] ? kmem_cache_alloc_trace+0x353/0x750 [ 1908.529238] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1908.534797] ? _copy_from_user+0xdf/0x150 [ 1908.538960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1908.544509] ? copy_mount_options+0x315/0x430 [ 1908.549024] ksys_mount+0x12d/0x140 [ 1908.552665] __x64_sys_mount+0xbe/0x150 [ 1908.556657] do_syscall_64+0x1b9/0x820 [ 1908.560556] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1908.565932] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1908.570875] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1908.575730] ? trace_hardirqs_on_caller+0x310/0x310 [ 1908.580775] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1908.585802] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1908.590868] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1908.595743] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1908.600937] RIP: 0033:0x457569 [ 1908.604138] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1908.623139] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1908.630876] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 03:55:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xb40}, 0x28) [ 1908.638157] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1908.645431] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1908.652703] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1908.659975] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 [ 1908.676519] overlayfs: failed to resolve './file0': -12 03:55:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa63}, 0x28) 03:55:42 executing program 5 (fault-call:2 fault-nth:25): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x880}, 0x28) 03:55:42 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x3f000000]}}]}, 0x80}}, 0x0) [ 1908.872166] FAULT_INJECTION: forcing a failure. [ 1908.872166] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1908.884021] CPU: 0 PID: 12228 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1908.890952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1908.900307] Call Trace: [ 1908.902916] dump_stack+0x244/0x39d [ 1908.906564] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1908.911764] ? zap_class+0x640/0x640 [ 1908.915504] should_fail.cold.4+0xa/0x17 [ 1908.919581] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1908.924698] ? find_held_lock+0x36/0x1c0 [ 1908.928782] ? mark_held_locks+0x130/0x130 [ 1908.933027] ? check_preemption_disabled+0x48/0x280 [ 1908.938056] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1908.942996] ? kasan_check_read+0x11/0x20 [ 1908.947150] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1908.952435] ? rcu_softirq_qs+0x20/0x20 [ 1908.956422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1908.961967] ? check_preemption_disabled+0x48/0x280 [ 1908.966993] ? debug_smp_processor_id+0x1c/0x20 [ 1908.972090] ? perf_trace_lock+0x14d/0x7a0 [ 1908.976335] ? is_bpf_text_address+0xd3/0x170 [ 1908.980880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1908.986437] ? should_fail+0x22d/0xd01 [ 1908.990342] ? lock_is_held_type+0x210/0x210 [ 1908.994758] ? unwind_get_return_address+0x61/0xa0 [ 1908.999695] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1909.004814] __alloc_pages_nodemask+0x34b/0xde0 [ 1909.009511] ? __alloc_pages_slowpath+0x2d70/0x2d70 [ 1909.014534] ? save_stack+0x43/0xd0 [ 1909.018165] ? kasan_kmalloc+0xc7/0xe0 [ 1909.022058] ? __kmalloc_track_caller+0x14a/0x750 [ 1909.026909] ? find_held_lock+0x36/0x1c0 [ 1909.031054] ? zstd_init+0x78/0x162 [ 1909.034710] ? trace_hardirqs_off+0xb8/0x310 [ 1909.039151] cache_grow_begin+0xa5/0x8c0 [ 1909.043222] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1909.048768] ? check_preemption_disabled+0x48/0x280 [ 1909.053797] kmem_cache_alloc+0x66b/0x730 [ 1909.057969] getname_kernel+0x54/0x370 [ 1909.061880] kern_path+0x1e/0x40 [ 1909.065268] ovl_mount_dir_noesc+0x6b/0x190 [ 1909.069608] ovl_mount_dir+0x10a/0x1c0 [ 1909.073509] ovl_fill_super+0x994/0x3f7b [ 1909.077599] ? ovl_show_options+0x550/0x550 [ 1909.081927] ? __free_pages+0x103/0x190 [ 1909.085913] ? selinux_sb_copy_data+0x602/0x740 [ 1909.090604] ? selinux_capable+0x36/0x40 [ 1909.094673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1909.100218] ? security_capable+0x99/0xc0 [ 1909.104375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1909.109933] ? get_anon_bdev+0xc0/0xc0 [ 1909.113828] ? sget+0x113/0x150 [ 1909.117128] ? ovl_show_options+0x550/0x550 [ 1909.121457] mount_nodev+0x6b/0x110 [ 1909.125097] ovl_mount+0x2c/0x40 [ 1909.128497] mount_fs+0xae/0x31d [ 1909.131892] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1909.136491] ? may_umount+0xb0/0xb0 [ 1909.140125] ? _raw_read_unlock+0x2c/0x50 [ 1909.144276] ? __get_fs_type+0x97/0xc0 [ 1909.148181] do_mount+0x581/0x31f0 [ 1909.151725] ? check_preemption_disabled+0x48/0x280 [ 1909.156754] ? copy_mount_string+0x40/0x40 [ 1909.161011] ? copy_mount_options+0x5f/0x430 [ 1909.165429] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1909.170452] ? kmem_cache_alloc_trace+0x353/0x750 [ 1909.175303] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1909.180855] ? _copy_from_user+0xdf/0x150 [ 1909.185025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1909.190572] ? copy_mount_options+0x315/0x430 [ 1909.195082] ksys_mount+0x12d/0x140 [ 1909.198723] __x64_sys_mount+0xbe/0x150 [ 1909.202710] do_syscall_64+0x1b9/0x820 [ 1909.206604] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1909.211981] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1909.216918] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1909.221771] ? trace_hardirqs_on_caller+0x310/0x310 [ 1909.226795] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1909.231839] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1909.236900] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1909.241767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1909.246961] RIP: 0033:0x457569 [ 1909.250165] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:55:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}}, 0x1c) close(r1) 03:55:42 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000002}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x28a}, 0x28) [ 1909.269070] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1909.276786] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1909.284057] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1909.291327] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1909.298599] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1909.305883] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x130d}, 0x28) 03:55:42 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0xf]}}]}, 0x80}}, 0x0) 03:55:42 executing program 5 (fault-call:2 fault-nth:26): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 1909.405208] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1909.467594] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x1c) close(r1) 03:55:43 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe000000e}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xc25}, 0x28) 03:55:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xe12}, 0x28) [ 1909.580085] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1909.611726] FAULT_INJECTION: forcing a failure. [ 1909.611726] name failslab, interval 1, probability 0, space 0, times 0 [ 1909.651680] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1909.662475] CPU: 0 PID: 12255 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1909.669435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1909.678793] Call Trace: [ 1909.681435] dump_stack+0x244/0x39d [ 1909.685096] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1909.690323] ? debug_smp_processor_id+0x1c/0x20 [ 1909.695020] ? perf_trace_lock+0x14d/0x7a0 [ 1909.699284] should_fail.cold.4+0xa/0x17 [ 1909.703372] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1909.708488] ? mark_held_locks+0x130/0x130 [ 1909.712745] ? zap_class+0x640/0x640 [ 1909.716463] ? __lock_acquire+0x62f/0x4c20 [ 1909.720710] ? find_held_lock+0x36/0x1c0 [ 1909.724781] ? __lock_is_held+0xb5/0x140 [ 1909.728886] ? perf_trace_sched_process_exec+0x860/0x860 [ 1909.734351] ? debug_smp_processor_id+0x1c/0x20 [ 1909.739041] __should_failslab+0x124/0x180 [ 1909.743286] should_failslab+0x9/0x14 [ 1909.747091] kmem_cache_alloc+0x2be/0x730 [ 1909.751256] ? avc_has_perm+0x469/0x7e0 [ 1909.755258] alloc_vfsmnt+0xe9/0x990 [ 1909.758992] ? m_stop+0x20/0x20 [ 1909.762279] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1909.767559] ? kasan_check_read+0x11/0x20 [ 1909.771726] ? rcu_softirq_qs+0x20/0x20 [ 1909.775713] ? find_held_lock+0x36/0x1c0 [ 1909.779800] ? mark_held_locks+0xc7/0x130 [ 1909.783969] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1909.789079] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1909.794200] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1909.798787] ? trace_hardirqs_on+0xbd/0x310 [ 1909.803111] ? kasan_check_read+0x11/0x20 [ 1909.807270] ? __percpu_counter_sum+0x135/0x1a0 [ 1909.811961] ? trace_hardirqs_off_caller+0x310/0x310 [ 1909.817077] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1909.822113] clone_mnt+0x124/0x13b0 [ 1909.825757] ? kern_mount_data+0xc0/0xc0 [ 1909.829833] ? ext4_fh_to_dentry+0x40/0x40 [ 1909.834090] ? filename_parentat.isra.56+0x570/0x570 [ 1909.839204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1909.844749] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1909.850292] ? statfs_by_dentry+0x1a9/0x210 [ 1909.854631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1909.860191] ? vfs_statfs+0x287/0x2e0 [ 1909.864042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1909.869593] ? ovl_check_namelen.isra.9+0xe8/0x140 [ 1909.874570] ? ovl_inode_init_once+0x20/0x20 [ 1909.879009] clone_private_mount+0xba/0x100 [ 1909.883343] ovl_fill_super+0xa88/0x3f7b [ 1909.887439] ? ovl_show_options+0x550/0x550 [ 1909.891776] ? __free_pages+0x103/0x190 [ 1909.895776] ? selinux_sb_copy_data+0x602/0x740 [ 1909.900495] ? selinux_capable+0x36/0x40 [ 1909.904560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1909.910108] ? security_capable+0x99/0xc0 [ 1909.914280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1909.919827] ? get_anon_bdev+0xc0/0xc0 [ 1909.923744] ? sget+0x113/0x150 [ 1909.927036] ? ovl_show_options+0x550/0x550 [ 1909.931374] mount_nodev+0x6b/0x110 [ 1909.935008] ovl_mount+0x2c/0x40 [ 1909.938382] mount_fs+0xae/0x31d [ 1909.941767] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1909.946360] ? may_umount+0xb0/0xb0 [ 1909.950005] ? _raw_read_unlock+0x2c/0x50 [ 1909.954157] ? __get_fs_type+0x97/0xc0 [ 1909.958058] do_mount+0x581/0x31f0 [ 1909.961602] ? check_preemption_disabled+0x48/0x280 [ 1909.966631] ? copy_mount_string+0x40/0x40 [ 1909.971324] ? copy_mount_options+0x5f/0x430 [ 1909.975738] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1909.980758] ? kmem_cache_alloc_trace+0x353/0x750 [ 1909.985606] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1909.991153] ? _copy_from_user+0xdf/0x150 [ 1909.995312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1910.000864] ? copy_mount_options+0x315/0x430 [ 1910.005379] ksys_mount+0x12d/0x140 [ 1910.009019] __x64_sys_mount+0xbe/0x150 [ 1910.013009] do_syscall_64+0x1b9/0x820 [ 1910.016915] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1910.022306] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1910.027252] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1910.032100] ? trace_hardirqs_on_caller+0x310/0x310 [ 1910.037123] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1910.042146] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1910.047179] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1910.052050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1910.057266] RIP: 0033:0x457569 [ 1910.060465] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1910.079513] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1910.087227] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1910.094498] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 03:55:43 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x1a0ffffffff]}}]}, 0x80}}, 0x0) [ 1910.101772] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1910.109046] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1910.116315] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0]}}, 0x1c) close(r1) [ 1910.149319] overlayfs: failed to clone upperpath 03:55:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x5fb}, 0x28) 03:55:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1274}, 0x28) 03:55:43 executing program 5 (fault-call:2 fault-nth:27): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:43 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000008}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:43 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x40030000000000]}}]}, 0x80}}, 0x0) [ 1910.333932] FAULT_INJECTION: forcing a failure. [ 1910.333932] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1910.345797] CPU: 0 PID: 12285 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1910.352734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1910.362125] Call Trace: [ 1910.364742] dump_stack+0x244/0x39d [ 1910.368399] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1910.373600] ? zap_class+0x640/0x640 [ 1910.377335] should_fail.cold.4+0xa/0x17 [ 1910.381413] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1910.386523] ? find_held_lock+0x36/0x1c0 [ 1910.390623] ? mark_held_locks+0x130/0x130 [ 1910.394897] ? check_preemption_disabled+0x48/0x280 [ 1910.399931] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1910.404897] ? kasan_check_read+0x11/0x20 [ 1910.409054] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1910.414341] ? rcu_softirq_qs+0x20/0x20 [ 1910.418325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1910.423878] ? check_preemption_disabled+0x48/0x280 [ 1910.428911] ? debug_smp_processor_id+0x1c/0x20 [ 1910.433586] ? perf_trace_lock+0x14d/0x7a0 [ 1910.437839] ? is_bpf_text_address+0xd3/0x170 [ 1910.442370] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1910.447953] ? should_fail+0x22d/0xd01 [ 1910.451887] ? lock_is_held_type+0x210/0x210 [ 1910.456301] ? unwind_get_return_address+0x61/0xa0 [ 1910.461239] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1910.466358] __alloc_pages_nodemask+0x34b/0xde0 [ 1910.471045] ? __alloc_pages_slowpath+0x2d70/0x2d70 [ 1910.476072] ? save_stack+0x43/0xd0 [ 1910.479701] ? kasan_kmalloc+0xc7/0xe0 [ 1910.483606] ? __kmalloc_track_caller+0x14a/0x750 [ 1910.488477] ? find_held_lock+0x36/0x1c0 [ 1910.492587] ? trace_hardirqs_off+0xb8/0x310 [ 1910.497008] cache_grow_begin+0xa5/0x8c0 [ 1910.501076] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1910.506625] ? check_preemption_disabled+0x48/0x280 [ 1910.511659] kmem_cache_alloc+0x66b/0x730 [ 1910.515828] getname_kernel+0x54/0x370 [ 1910.519739] kern_path+0x1e/0x40 [ 1910.523118] ovl_mount_dir_noesc+0x6b/0x190 [ 1910.527472] ovl_mount_dir+0x10a/0x1c0 [ 1910.531378] ovl_fill_super+0x994/0x3f7b [ 1910.535469] ? ovl_show_options+0x550/0x550 [ 1910.539805] ? __free_pages+0x103/0x190 [ 1910.543788] ? selinux_sb_copy_data+0x602/0x740 [ 1910.548474] ? selinux_capable+0x36/0x40 [ 1910.552539] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1910.558087] ? security_capable+0x99/0xc0 [ 1910.562246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1910.567811] ? get_anon_bdev+0xc0/0xc0 [ 1910.571704] ? sget+0x113/0x150 [ 1910.575003] ? ovl_show_options+0x550/0x550 [ 1910.579331] mount_nodev+0x6b/0x110 [ 1910.582989] ovl_mount+0x2c/0x40 [ 1910.586366] mount_fs+0xae/0x31d [ 1910.589752] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1910.594348] ? may_umount+0xb0/0xb0 [ 1910.597984] ? _raw_read_unlock+0x2c/0x50 [ 1910.602138] ? __get_fs_type+0x97/0xc0 [ 1910.606043] do_mount+0x581/0x31f0 [ 1910.609594] ? check_preemption_disabled+0x48/0x280 [ 1910.614628] ? copy_mount_string+0x40/0x40 [ 1910.618899] ? copy_mount_options+0x5f/0x430 [ 1910.623317] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1910.628393] ? kmem_cache_alloc_trace+0x353/0x750 [ 1910.633246] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1910.638793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1910.644332] ? copy_mount_options+0x315/0x430 [ 1910.648863] ksys_mount+0x12d/0x140 [ 1910.652512] __x64_sys_mount+0xbe/0x150 [ 1910.656497] do_syscall_64+0x1b9/0x820 [ 1910.660433] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1910.665804] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1910.670742] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1910.675590] ? trace_hardirqs_on_caller+0x310/0x310 [ 1910.680626] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1910.685648] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1910.690682] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1910.695553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1910.700745] RIP: 0033:0x457569 [ 1910.703948] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1910.722861] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:55:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x572}, 0x28) 03:55:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa0b}, 0x28) [ 1910.730601] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1910.737885] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1910.745161] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1910.752433] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1910.759716] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:44 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x10f6}, 0x28) 03:55:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xfda}, 0x28) 03:55:44 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xf]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:44 executing program 5 (fault-call:2 fault-nth:28): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x1c) close(r1) 03:55:44 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0xf000000]}}]}, 0x80}}, 0x0) 03:55:44 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x92e}, 0x28) 03:55:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x88e}, 0x28) [ 1911.023802] FAULT_INJECTION: forcing a failure. [ 1911.023802] name failslab, interval 1, probability 0, space 0, times 0 [ 1911.050652] CPU: 1 PID: 12313 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1911.057618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1911.066977] Call Trace: [ 1911.069607] dump_stack+0x244/0x39d [ 1911.073316] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1911.078547] ? debug_smp_processor_id+0x1c/0x20 [ 1911.083234] ? perf_trace_lock+0x14d/0x7a0 [ 1911.087497] should_fail.cold.4+0xa/0x17 [ 1911.091586] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1911.094227] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1911.096718] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1911.112141] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1911.117298] ? trace_hardirqs_on+0xbd/0x310 [ 1911.121648] ? kasan_check_read+0x11/0x20 [ 1911.125817] ? ida_alloc_range+0x51e/0xad0 [ 1911.130082] ? zap_class+0x640/0x640 [ 1911.133825] ? save_stack+0x43/0xd0 [ 1911.137469] ? kasan_kmalloc+0xc7/0xe0 [ 1911.141364] ? kmem_cache_alloc+0x12e/0x730 [ 1911.145707] ? find_held_lock+0x36/0x1c0 [ 1911.149782] ? __lock_is_held+0xb5/0x140 [ 1911.153908] ? perf_trace_sched_process_exec+0x860/0x860 [ 1911.159403] __should_failslab+0x124/0x180 [ 1911.163666] should_failslab+0x9/0x14 [ 1911.167495] __kmalloc_track_caller+0x2d0/0x750 [ 1911.172179] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1911.177203] ? kstrdup_const+0x66/0x80 [ 1911.181102] kstrdup+0x39/0x70 [ 1911.184315] kstrdup_const+0x66/0x80 [ 1911.188036] alloc_vfsmnt+0x186/0x990 [ 1911.191842] ? m_stop+0x20/0x20 [ 1911.195153] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1911.200433] ? kasan_check_read+0x11/0x20 [ 1911.204589] ? rcu_softirq_qs+0x20/0x20 [ 1911.208622] ? find_held_lock+0x36/0x1c0 [ 1911.212738] ? mark_held_locks+0xc7/0x130 [ 1911.216901] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1911.222025] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1911.227135] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1911.231723] ? trace_hardirqs_on+0xbd/0x310 [ 1911.236073] ? kasan_check_read+0x11/0x20 [ 1911.240249] ? __percpu_counter_sum+0x135/0x1a0 [ 1911.244924] ? trace_hardirqs_off_caller+0x310/0x310 [ 1911.250052] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1911.255090] clone_mnt+0x124/0x13b0 [ 1911.258733] ? kern_mount_data+0xc0/0xc0 [ 1911.262809] ? ext4_fh_to_dentry+0x40/0x40 [ 1911.267075] ? filename_parentat.isra.56+0x570/0x570 [ 1911.272190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1911.277734] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1911.283292] ? statfs_by_dentry+0x1a9/0x210 [ 1911.287620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1911.293164] ? vfs_statfs+0x287/0x2e0 [ 1911.296976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1911.302535] ? ovl_check_namelen.isra.9+0xe8/0x140 [ 1911.307473] ? ovl_inode_init_once+0x20/0x20 [ 1911.311925] clone_private_mount+0xba/0x100 [ 1911.316262] ovl_fill_super+0xa88/0x3f7b [ 1911.320357] ? ovl_show_options+0x550/0x550 [ 1911.324690] ? __free_pages+0x103/0x190 [ 1911.328685] ? selinux_sb_copy_data+0x602/0x740 [ 1911.333379] ? selinux_capable+0x36/0x40 [ 1911.337475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1911.343021] ? security_capable+0x99/0xc0 [ 1911.347188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1911.352755] ? get_anon_bdev+0xc0/0xc0 [ 1911.356663] ? sget+0x113/0x150 [ 1911.359958] ? ovl_show_options+0x550/0x550 [ 1911.364290] mount_nodev+0x6b/0x110 [ 1911.367930] ovl_mount+0x2c/0x40 [ 1911.371314] mount_fs+0xae/0x31d [ 1911.374708] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1911.379299] ? may_umount+0xb0/0xb0 [ 1911.382933] ? _raw_read_unlock+0x2c/0x50 [ 1911.387085] ? __get_fs_type+0x97/0xc0 [ 1911.390988] do_mount+0x581/0x31f0 [ 1911.394542] ? check_preemption_disabled+0x48/0x280 [ 1911.399603] ? copy_mount_string+0x40/0x40 [ 1911.403884] ? copy_mount_options+0x5f/0x430 [ 1911.408309] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1911.413339] ? kmem_cache_alloc_trace+0x353/0x750 [ 1911.418224] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1911.423770] ? _copy_from_user+0xdf/0x150 [ 1911.427930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1911.433479] ? copy_mount_options+0x315/0x430 [ 1911.437989] ksys_mount+0x12d/0x140 [ 1911.441639] __x64_sys_mount+0xbe/0x150 [ 1911.445627] do_syscall_64+0x1b9/0x820 [ 1911.449521] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1911.454897] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1911.459832] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1911.464692] ? trace_hardirqs_on_caller+0x310/0x310 [ 1911.469719] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1911.474743] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1911.479772] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1911.484630] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1911.489823] RIP: 0033:0x457569 [ 1911.493031] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1911.511934] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:55:45 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x500000000000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1911.519652] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1911.526925] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1911.534196] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1911.541465] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1911.548734] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 [ 1911.581977] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1911.596455] overlayfs: failed to clone upperpath 03:55:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xefc}, 0x28) 03:55:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x7e7}, 0x28) 03:55:45 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x8000a0]}}]}, 0x80}}, 0x0) 03:55:45 executing program 5 (fault-call:2 fault-nth:29): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}, 0x1c) close(r1) 03:55:45 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xf000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1911.777494] FAULT_INJECTION: forcing a failure. [ 1911.777494] name failslab, interval 1, probability 0, space 0, times 0 [ 1911.799937] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1911.814646] CPU: 1 PID: 12342 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1911.821615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1911.830981] Call Trace: [ 1911.833603] dump_stack+0x244/0x39d [ 1911.837262] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1911.842502] ? debug_smp_processor_id+0x1c/0x20 [ 1911.847180] ? perf_trace_lock+0x14d/0x7a0 [ 1911.847208] should_fail.cold.4+0xa/0x17 [ 1911.847231] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1911.860641] ? zap_class+0x640/0x640 [ 1911.864372] ? save_stack+0xa9/0xd0 [ 1911.868029] ? save_stack+0x43/0xd0 [ 1911.871672] ? kasan_kmalloc+0xc7/0xe0 [ 1911.875616] ? __kmalloc_track_caller+0x14a/0x750 [ 1911.880494] ? find_held_lock+0x36/0x1c0 [ 1911.884585] ? __lock_is_held+0xb5/0x140 [ 1911.888697] ? perf_trace_sched_process_exec+0x860/0x860 [ 1911.894168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1911.899732] ? check_preemption_disabled+0x48/0x280 [ 1911.904785] __should_failslab+0x124/0x180 [ 1911.909055] should_failslab+0x9/0x14 [ 1911.912888] kmem_cache_alloc+0x2be/0x730 [ 1911.917075] getname_kernel+0x54/0x370 [ 1911.920994] kern_path+0x1e/0x40 03:55:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x38}, 0x28) [ 1911.924396] ovl_mount_dir_noesc+0x6b/0x190 [ 1911.928749] ovl_mount_dir+0x10a/0x1c0 [ 1911.932679] ovl_fill_super+0xbbf/0x3f7b [ 1911.936798] ? ovl_show_options+0x550/0x550 [ 1911.941155] ? __free_pages+0x103/0x190 [ 1911.945157] ? selinux_sb_copy_data+0x602/0x740 [ 1911.949878] ? selinux_capable+0x36/0x40 [ 1911.953981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1911.959543] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1911.965117] ? get_anon_bdev+0xc0/0xc0 [ 1911.969030] ? sget+0x113/0x150 [ 1911.972340] ? ovl_show_options+0x550/0x550 03:55:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x97d}, 0x28) [ 1911.976693] mount_nodev+0x6b/0x110 [ 1911.980355] ovl_mount+0x2c/0x40 [ 1911.983759] mount_fs+0xae/0x31d [ 1911.987164] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1911.991771] ? may_umount+0xb0/0xb0 [ 1911.995430] ? _raw_read_unlock+0x2c/0x50 [ 1911.999607] ? __get_fs_type+0x97/0xc0 [ 1912.003535] do_mount+0x581/0x31f0 [ 1912.007099] ? check_preemption_disabled+0x48/0x280 [ 1912.012145] ? copy_mount_string+0x40/0x40 [ 1912.016425] ? copy_mount_options+0x5f/0x430 [ 1912.020864] ? rcu_read_lock_sched_held+0x14f/0x180 03:55:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d4c]}}, 0x1c) close(r1) [ 1912.025904] ? kmem_cache_alloc_trace+0x353/0x750 [ 1912.030772] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1912.036333] ? _copy_from_user+0xdf/0x150 [ 1912.040514] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1912.046079] ? copy_mount_options+0x315/0x430 [ 1912.050610] ksys_mount+0x12d/0x140 [ 1912.054264] __x64_sys_mount+0xbe/0x150 [ 1912.058264] do_syscall_64+0x1b9/0x820 [ 1912.062180] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1912.067567] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1912.072517] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1912.077898] ? trace_hardirqs_on_caller+0x310/0x310 [ 1912.082939] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1912.087969] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1912.093008] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1912.097883] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1912.103086] RIP: 0033:0x457569 [ 1912.106286] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1912.125197] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1912.132929] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1912.140206] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1912.147479] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1912.154762] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1912.162037] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 [ 1912.184110] overlayfs: failed to resolve './file1': -12 03:55:45 executing program 5 (fault-call:2 fault-nth:30): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa75}, 0x28) 03:55:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xedf}, 0x28) 03:55:45 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x2000]}}]}, 0x80}}, 0x0) 03:55:45 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x1a0]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1912.296839] FAULT_INJECTION: forcing a failure. [ 1912.296839] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1912.308730] CPU: 1 PID: 12363 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1912.308743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1912.308750] Call Trace: [ 1912.308777] dump_stack+0x244/0x39d [ 1912.308806] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1912.336495] ? zap_class+0x640/0x640 [ 1912.336529] should_fail.cold.4+0xa/0x17 [ 1912.336554] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1912.336574] ? find_held_lock+0x36/0x1c0 [ 1912.353510] ? mark_held_locks+0x130/0x130 [ 1912.357754] ? check_preemption_disabled+0x48/0x280 [ 1912.362795] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1912.367732] ? kasan_check_read+0x11/0x20 [ 1912.371896] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1912.377192] ? rcu_softirq_qs+0x20/0x20 [ 1912.381178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1912.386732] ? check_preemption_disabled+0x48/0x280 [ 1912.391763] ? debug_smp_processor_id+0x1c/0x20 [ 1912.396442] ? perf_trace_lock+0x14d/0x7a0 [ 1912.400687] ? is_bpf_text_address+0xd3/0x170 [ 1912.405197] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1912.410744] ? should_fail+0x22d/0xd01 [ 1912.414675] ? lock_is_held_type+0x210/0x210 [ 1912.419092] ? unwind_get_return_address+0x61/0xa0 [ 1912.424034] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1912.429159] __alloc_pages_nodemask+0x34b/0xde0 [ 1912.433871] ? __alloc_pages_slowpath+0x2d70/0x2d70 [ 1912.438901] ? save_stack+0x43/0xd0 [ 1912.442535] ? kasan_kmalloc+0xc7/0xe0 [ 1912.446428] ? __kmalloc_track_caller+0x14a/0x750 [ 1912.451286] ? find_held_lock+0x36/0x1c0 [ 1912.455398] ? trace_hardirqs_off+0xb8/0x310 [ 1912.459821] cache_grow_begin+0xa5/0x8c0 [ 1912.463903] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1912.469461] ? check_preemption_disabled+0x48/0x280 [ 1912.474500] kmem_cache_alloc+0x66b/0x730 [ 1912.478677] getname_kernel+0x54/0x370 [ 1912.482578] kern_path+0x1e/0x40 [ 1912.485966] ovl_mount_dir_noesc+0x6b/0x190 [ 1912.490305] ovl_mount_dir+0x10a/0x1c0 [ 1912.494209] ovl_fill_super+0xbbf/0x3f7b [ 1912.498309] ? ovl_show_options+0x550/0x550 [ 1912.502640] ? __free_pages+0x103/0x190 [ 1912.506638] ? selinux_sb_copy_data+0x602/0x740 [ 1912.511330] ? selinux_capable+0x36/0x40 [ 1912.515404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1912.520956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1912.526510] ? get_anon_bdev+0xc0/0xc0 [ 1912.530412] ? sget+0x113/0x150 [ 1912.533726] ? ovl_show_options+0x550/0x550 [ 1912.538061] mount_nodev+0x6b/0x110 [ 1912.541700] ovl_mount+0x2c/0x40 [ 1912.545082] mount_fs+0xae/0x31d [ 1912.548468] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1912.553061] ? may_umount+0xb0/0xb0 [ 1912.556707] ? _raw_read_unlock+0x2c/0x50 [ 1912.560877] ? __get_fs_type+0x97/0xc0 [ 1912.564787] do_mount+0x581/0x31f0 [ 1912.568334] ? check_preemption_disabled+0x48/0x280 [ 1912.573370] ? copy_mount_string+0x40/0x40 [ 1912.577639] ? copy_mount_options+0x5f/0x430 [ 1912.582055] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1912.587084] ? kmem_cache_alloc_trace+0x353/0x750 [ 1912.591939] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1912.597490] ? _copy_from_user+0xdf/0x150 [ 1912.601656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1912.607199] ? copy_mount_options+0x315/0x430 [ 1912.611710] ksys_mount+0x12d/0x140 [ 1912.615352] __x64_sys_mount+0xbe/0x150 [ 1912.619348] do_syscall_64+0x1b9/0x820 [ 1912.623255] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1912.628631] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1912.633570] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1912.638425] ? trace_hardirqs_on_caller+0x310/0x310 [ 1912.643450] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1912.648481] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1912.653521] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1912.658401] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1912.663601] RIP: 0033:0x457569 [ 1912.666801] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1912.685704] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1912.693422] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1912.700698] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1912.707972] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1912.715246] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1912.722516] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:46 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x12a3}, 0x28) 03:55:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x827}, 0x28) 03:55:46 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0xff3f000000000000]}}]}, 0x80}}, 0x0) 03:55:46 executing program 5 (fault-call:2 fault-nth:31): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:46 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x3f00]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xb93}, 0x28) 03:55:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}, 0x1c) close(r1) 03:55:46 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x395}, 0x28) 03:55:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1191}, 0x28) [ 1913.011457] FAULT_INJECTION: forcing a failure. [ 1913.011457] name failslab, interval 1, probability 0, space 0, times 0 [ 1913.024017] CPU: 1 PID: 12396 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1913.030983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1913.040357] Call Trace: [ 1913.042983] dump_stack+0x244/0x39d [ 1913.046667] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1913.051900] ? debug_smp_processor_id+0x1c/0x20 [ 1913.056595] ? perf_trace_lock+0x14d/0x7a0 [ 1913.060876] should_fail.cold.4+0xa/0x17 [ 1913.064971] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1913.070100] ? __lock_acquire+0x62f/0x4c20 [ 1913.074357] ? check_preemption_disabled+0x48/0x280 [ 1913.079410] ? debug_smp_processor_id+0x1c/0x20 [ 1913.084112] ? zap_class+0x640/0x640 [ 1913.087875] ? find_held_lock+0x36/0x1c0 [ 1913.091963] ? __lock_is_held+0xb5/0x140 [ 1913.096085] ? perf_trace_sched_process_exec+0x860/0x860 [ 1913.101578] __should_failslab+0x124/0x180 [ 1913.105832] should_failslab+0x9/0x14 [ 1913.109652] kmem_cache_alloc+0x2be/0x730 [ 1913.113809] ? __lock_acquire+0x62f/0x4c20 [ 1913.118064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1913.123610] ? check_preemption_disabled+0x48/0x280 [ 1913.128640] __d_alloc+0xc8/0xcc0 [ 1913.132104] ? __lock_acquire+0x62f/0x4c20 [ 1913.136347] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 1913.141382] ? mark_held_locks+0x130/0x130 [ 1913.145633] ? lock_is_held_type+0x210/0x210 [ 1913.150094] ? mark_held_locks+0x130/0x130 [ 1913.154334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1913.159885] ? check_preemption_disabled+0x48/0x280 [ 1913.164917] ? debug_smp_processor_id+0x1c/0x20 [ 1913.169591] ? perf_trace_lock+0x14d/0x7a0 [ 1913.173841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1913.179402] ? check_preemption_disabled+0x48/0x280 [ 1913.184432] d_alloc+0x96/0x380 [ 1913.187722] ? perf_trace_lock+0x14d/0x7a0 [ 1913.191971] ? __d_alloc+0xcc0/0xcc0 [ 1913.195699] ? lock_is_held_type+0x210/0x210 [ 1913.200122] d_alloc_parallel+0x15a/0x1f40 [ 1913.204367] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1913.209659] ? zap_class+0x640/0x640 [ 1913.213392] ? find_held_lock+0x36/0x1c0 [ 1913.217463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1913.223008] ? check_preemption_disabled+0x48/0x280 [ 1913.228039] ? __d_lookup_rcu+0xaa0/0xaa0 [ 1913.232196] ? find_held_lock+0x36/0x1c0 [ 1913.236276] ? __d_lookup+0x591/0x9e0 [ 1913.240090] ? lock_downgrade+0x900/0x900 [ 1913.244248] ? check_preemption_disabled+0x48/0x280 [ 1913.249280] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1913.254233] ? kasan_check_read+0x11/0x20 [ 1913.258398] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1913.263707] ? rcu_softirq_qs+0x20/0x20 [ 1913.267699] ? __lockdep_init_map+0x105/0x590 [ 1913.272204] ? __lockdep_init_map+0x105/0x590 [ 1913.276712] ? lockdep_init_map+0x9/0x10 [ 1913.280782] ? __init_waitqueue_head+0x9e/0x150 [ 1913.285461] ? init_wait_entry+0x1c0/0x1c0 [ 1913.289705] ? d_lookup+0x255/0x300 [ 1913.293341] ? d_lookup+0x255/0x300 [ 1913.296987] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1913.301587] __lookup_slow+0x1e6/0x540 [ 1913.305492] ? vfs_unlink+0x510/0x510 [ 1913.309302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1913.314873] ? d_lookup+0x20d/0x300 [ 1913.318540] lookup_one_len+0x1d8/0x220 [ 1913.322537] ? lookup_one_len_unlocked+0x100/0x100 [ 1913.327480] ? down_write_nested+0x8e/0x130 [ 1913.331810] ? ovl_workdir_create+0x12f/0x820 [ 1913.336330] ? _down_write_nest_lock+0x130/0x130 [ 1913.341107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1913.346667] ovl_workdir_create+0x18e/0x820 [ 1913.351011] ? ovl_mount_dir+0x1c0/0x1c0 [ 1913.355076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1913.360622] ? __mnt_want_write+0x327/0x420 [ 1913.364957] ? may_umount_tree+0x210/0x210 [ 1913.369203] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1913.374229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1913.379779] ? __sb_start_write+0x1b2/0x370 [ 1913.384124] ovl_fill_super+0xdd4/0x3f7b [ 1913.388226] ? ovl_show_options+0x550/0x550 [ 1913.392583] ? __free_pages+0x103/0x190 [ 1913.396578] ? selinux_sb_copy_data+0x602/0x740 [ 1913.401278] ? selinux_capable+0x36/0x40 [ 1913.405351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1913.410913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1913.416470] ? get_anon_bdev+0xc0/0xc0 [ 1913.420365] ? sget+0x113/0x150 [ 1913.423664] ? ovl_show_options+0x550/0x550 [ 1913.428005] mount_nodev+0x6b/0x110 [ 1913.431644] ovl_mount+0x2c/0x40 [ 1913.435025] mount_fs+0xae/0x31d [ 1913.438417] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1913.443014] ? may_umount+0xb0/0xb0 [ 1913.446654] ? _raw_read_unlock+0x2c/0x50 [ 1913.450810] ? __get_fs_type+0x97/0xc0 [ 1913.454720] do_mount+0x581/0x31f0 [ 1913.458267] ? check_preemption_disabled+0x48/0x280 [ 1913.463305] ? copy_mount_string+0x40/0x40 [ 1913.467570] ? copy_mount_options+0x5f/0x430 [ 1913.471991] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1913.477026] ? kmem_cache_alloc_trace+0x353/0x750 [ 1913.481887] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1913.487433] ? _copy_from_user+0xdf/0x150 [ 1913.491606] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1913.497149] ? copy_mount_options+0x315/0x430 [ 1913.501661] ksys_mount+0x12d/0x140 [ 1913.505301] __x64_sys_mount+0xbe/0x150 [ 1913.509292] do_syscall_64+0x1b9/0x820 [ 1913.513194] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1913.518573] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1913.523514] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1913.528369] ? trace_hardirqs_on_caller+0x310/0x310 [ 1913.533424] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1913.538452] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1913.543486] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1913.548349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1913.553546] RIP: 0033:0x457569 [ 1913.556751] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1913.575659] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1913.583382] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1913.590658] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1913.597931] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1913.605204] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 03:55:47 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x5]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1913.612476] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 [ 1913.650197] overlayfs: failed to create directory ./file1\/work (errno: 12); mounting read-only [ 1913.677831] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x7fa}, 0x28) 03:55:47 executing program 5 (fault-call:2 fault-nth:32): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:47 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x2000000]}}]}, 0x80}}, 0x0) [ 1913.732517] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x300}, 0x28) 03:55:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7530]}}, 0x1c) close(r1) 03:55:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x9d6}, 0x28) 03:55:47 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x34000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1913.870387] FAULT_INJECTION: forcing a failure. [ 1913.870387] name failslab, interval 1, probability 0, space 0, times 0 [ 1913.927793] CPU: 0 PID: 12423 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1913.934788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1913.944160] Call Trace: [ 1913.946781] dump_stack+0x244/0x39d [ 1913.950447] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1913.955674] ? mark_held_locks+0x130/0x130 [ 1913.959955] should_fail.cold.4+0xa/0x17 [ 1913.964049] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1913.969176] ? lock_unpin_lock+0x4a0/0x4a0 [ 1913.973440] ? print_usage_bug+0xc0/0xc0 [ 1913.977526] ? perf_trace_lock+0x14d/0x7a0 [ 1913.981787] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1913.986739] ? zap_class+0x640/0x640 [ 1913.990469] ? zap_class+0x640/0x640 [ 1913.994206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1913.999754] ? check_preemption_disabled+0x48/0x280 [ 1914.004771] ? __lock_is_held+0xb5/0x140 [ 1914.008841] ? perf_trace_sched_process_exec+0x860/0x860 [ 1914.014303] ? mark_held_locks+0x130/0x130 [ 1914.018539] __should_failslab+0x124/0x180 [ 1914.022770] should_failslab+0x9/0x14 [ 1914.026580] kmem_cache_alloc+0x2be/0x730 [ 1914.030743] ? debug_smp_processor_id+0x1c/0x20 [ 1914.035420] ? ratelimit_state_init+0xb0/0xb0 [ 1914.039925] ext4_alloc_inode+0xc7/0x870 [ 1914.043995] ? ratelimit_state_init+0xb0/0xb0 [ 1914.048509] ? print_usage_bug+0xc0/0xc0 [ 1914.052582] ? __lock_acquire+0x62f/0x4c20 [ 1914.056812] ? __getblk_gfp+0x11b/0xd50 [ 1914.060796] ? zap_class+0x640/0x640 [ 1914.064520] ? zap_class+0x640/0x640 [ 1914.068241] ? perf_trace_lock+0x14d/0x7a0 [ 1914.072470] ? print_usage_bug+0xc0/0xc0 [ 1914.076673] ? print_usage_bug+0xc0/0xc0 [ 1914.080744] ? __lock_acquire+0x62f/0x4c20 [ 1914.084977] ? __lock_acquire+0x62f/0x4c20 [ 1914.089206] ? zap_class+0x640/0x640 [ 1914.092916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1914.098464] ? ratelimit_state_init+0xb0/0xb0 [ 1914.102988] alloc_inode+0x63/0x190 [ 1914.106628] new_inode_pseudo+0x71/0x1a0 [ 1914.110693] ? prune_icache_sb+0x1c0/0x1c0 [ 1914.114932] new_inode+0x1c/0x40 [ 1914.118311] __ext4_new_inode+0x4cd/0x65b0 [ 1914.122549] ? debug_smp_processor_id+0x1c/0x20 [ 1914.127218] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1914.132750] ? ext4_free_inode+0x1a10/0x1a10 [ 1914.137162] ? debug_smp_processor_id+0x1c/0x20 [ 1914.141845] ? perf_trace_lock+0x14d/0x7a0 [ 1914.146108] ? find_held_lock+0x36/0x1c0 [ 1914.150170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1914.155702] ? lock_is_held_type+0x210/0x210 [ 1914.160103] ? debug_smp_processor_id+0x1c/0x20 [ 1914.164770] ? find_held_lock+0x36/0x1c0 [ 1914.168824] ? zap_class+0x640/0x640 [ 1914.172545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1914.178090] ? check_preemption_disabled+0x48/0x280 [ 1914.183138] ? find_held_lock+0x36/0x1c0 [ 1914.187235] ? lock_downgrade+0x900/0x900 [ 1914.191389] ? check_preemption_disabled+0x48/0x280 [ 1914.196405] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1914.201336] ? kasan_check_read+0x11/0x20 [ 1914.205502] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1914.210790] ? rcu_softirq_qs+0x20/0x20 [ 1914.214764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1914.220294] ? avc_has_perm+0x55f/0x7e0 [ 1914.224275] ? avc_has_perm_noaudit+0x630/0x630 [ 1914.228944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1914.234482] ? __dquot_initialize+0x629/0xdd0 [ 1914.238983] ? dquot_get_next_dqblk+0x180/0x180 [ 1914.243659] ext4_mkdir+0x2e1/0xe60 [ 1914.247284] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1914.252813] ? ext4_init_dot_dotdot+0x510/0x510 [ 1914.257479] ? selinux_inode_mkdir+0x22/0x30 [ 1914.261888] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1914.267418] ? security_inode_mkdir+0xe8/0x120 [ 1914.271997] vfs_mkdir+0x42e/0x6b0 [ 1914.275535] ovl_create_real+0x225/0x410 [ 1914.279607] ovl_workdir_create+0x564/0x820 [ 1914.283941] ? ovl_mount_dir+0x1c0/0x1c0 [ 1914.287993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1914.293539] ovl_fill_super+0xdd4/0x3f7b [ 1914.297822] ? ovl_show_options+0x550/0x550 [ 1914.302159] ? __free_pages+0x103/0x190 [ 1914.306143] ? selinux_sb_copy_data+0x602/0x740 [ 1914.310834] ? selinux_capable+0x36/0x40 [ 1914.314916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1914.320468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1914.326021] ? get_anon_bdev+0xc0/0xc0 [ 1914.329916] ? sget+0x113/0x150 [ 1914.333199] ? ovl_show_options+0x550/0x550 [ 1914.337515] mount_nodev+0x6b/0x110 [ 1914.341138] ovl_mount+0x2c/0x40 [ 1914.344501] mount_fs+0xae/0x31d [ 1914.347878] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1914.352466] ? may_umount+0xb0/0xb0 [ 1914.356086] ? _raw_read_unlock+0x2c/0x50 [ 1914.360238] ? __get_fs_type+0x97/0xc0 [ 1914.364144] do_mount+0x581/0x31f0 [ 1914.367702] ? check_preemption_disabled+0x48/0x280 [ 1914.372729] ? copy_mount_string+0x40/0x40 [ 1914.376988] ? copy_mount_options+0x5f/0x430 [ 1914.381411] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1914.386422] ? kmem_cache_alloc_trace+0x353/0x750 [ 1914.391273] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1914.396824] ? _copy_from_user+0xdf/0x150 [ 1914.401012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1914.406565] ? copy_mount_options+0x315/0x430 [ 1914.411091] ksys_mount+0x12d/0x140 [ 1914.414729] __x64_sys_mount+0xbe/0x150 [ 1914.418713] do_syscall_64+0x1b9/0x820 [ 1914.422600] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1914.427978] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1914.432930] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1914.437778] ? trace_hardirqs_on_caller+0x310/0x310 [ 1914.442797] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1914.447808] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1914.452820] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1914.457685] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1914.462897] RIP: 0033:0x457569 03:55:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x130e}, 0x28) [ 1914.466084] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1914.484984] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1914.492685] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1914.499953] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1914.507227] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1914.514501] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1914.521767] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:48 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0xffffffffa0008000]}}]}, 0x80}}, 0x0) [ 1914.546394] overlayfs: failed to create directory ./file1\/work (errno: 12); mounting read-only 03:55:48 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x8fe}, 0x28) 03:55:48 executing program 5 (fault-call:2 fault-nth:33): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:48 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x40030000000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x115c}, 0x28) 03:55:48 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xbe9}, 0x28) [ 1914.744522] FAULT_INJECTION: forcing a failure. [ 1914.744522] name failslab, interval 1, probability 0, space 0, times 0 [ 1914.756189] CPU: 0 PID: 12455 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1914.763142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1914.772503] Call Trace: [ 1914.775105] dump_stack+0x244/0x39d [ 1914.778752] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1914.783974] should_fail.cold.4+0xa/0x17 [ 1914.788055] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1914.793164] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1914.797758] ? trace_hardirqs_on+0xbd/0x310 [ 1914.802086] ? kasan_check_read+0x11/0x20 [ 1914.806241] ? __debug_object_init+0x57d/0x1290 [ 1914.810922] ? trace_hardirqs_off_caller+0x310/0x310 [ 1914.816033] ? do_raw_spin_trylock+0x270/0x270 [ 1914.820631] ? zap_class+0x640/0x640 [ 1914.824363] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1914.829476] ? __debug_object_init+0x57d/0x1290 [ 1914.834153] ? vfs_mkdir+0x42e/0x6b0 [ 1914.837888] ? ovl_create_real+0x225/0x410 [ 1914.842137] ? ovl_workdir_create+0x564/0x820 [ 1914.846643] ? ovl_fill_super+0xdd4/0x3f7b [ 1914.850904] ? __lock_is_held+0xb5/0x140 [ 1914.854977] ? debug_object_free+0x690/0x690 [ 1914.859417] ? perf_trace_sched_process_exec+0x860/0x860 [ 1914.864887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1914.870437] ? check_preemption_disabled+0x48/0x280 [ 1914.875504] __should_failslab+0x124/0x180 [ 1914.879752] should_failslab+0x9/0x14 [ 1914.883561] kmem_cache_alloc+0x2be/0x730 [ 1914.887738] selinux_inode_alloc_security+0x107/0x3a0 [ 1914.892945] ? inode_free_rcu+0x20/0x20 [ 1914.896950] ? __put_user_ns+0x60/0x60 [ 1914.900857] ? lockdep_init_map+0x9/0x10 [ 1914.904937] ? ext4_alloc_inode+0x6e3/0x870 [ 1914.909276] security_inode_alloc+0x73/0xd0 [ 1914.913615] inode_init_always+0x68f/0xd80 [ 1914.917864] ? __getblk_gfp+0x11b/0xd50 [ 1914.921872] ? __address_space_init_once+0x240/0x240 [ 1914.926992] ? zap_class+0x640/0x640 [ 1914.930713] ? perf_trace_lock+0x14d/0x7a0 [ 1914.934954] ? print_usage_bug+0xc0/0xc0 [ 1914.939027] ? print_usage_bug+0xc0/0xc0 [ 1914.943097] ? __lock_acquire+0x62f/0x4c20 [ 1914.947338] ? __lock_acquire+0x62f/0x4c20 [ 1914.951589] ? zap_class+0x640/0x640 [ 1914.955314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1914.960884] alloc_inode+0x80/0x190 [ 1914.964523] new_inode_pseudo+0x71/0x1a0 [ 1914.969055] ? prune_icache_sb+0x1c0/0x1c0 [ 1914.973311] new_inode+0x1c/0x40 [ 1914.976684] __ext4_new_inode+0x4cd/0x65b0 [ 1914.980932] ? debug_smp_processor_id+0x1c/0x20 [ 1914.985617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1914.991165] ? ext4_free_inode+0x1a10/0x1a10 [ 1914.995580] ? debug_smp_processor_id+0x1c/0x20 [ 1915.000258] ? perf_trace_lock+0x14d/0x7a0 [ 1915.004497] ? find_held_lock+0x36/0x1c0 [ 1915.008569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1915.014119] ? lock_is_held_type+0x210/0x210 [ 1915.018539] ? debug_smp_processor_id+0x1c/0x20 [ 1915.023224] ? find_held_lock+0x36/0x1c0 [ 1915.027292] ? zap_class+0x640/0x640 [ 1915.031025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1915.036570] ? check_preemption_disabled+0x48/0x280 [ 1915.041609] ? find_held_lock+0x36/0x1c0 [ 1915.045694] ? lock_downgrade+0x900/0x900 [ 1915.049856] ? check_preemption_disabled+0x48/0x280 [ 1915.054906] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1915.059843] ? kasan_check_read+0x11/0x20 [ 1915.064017] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1915.069309] ? rcu_softirq_qs+0x20/0x20 [ 1915.073307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1915.078864] ? avc_has_perm+0x55f/0x7e0 [ 1915.082883] ? avc_has_perm_noaudit+0x630/0x630 [ 1915.087574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1915.093131] ? __dquot_initialize+0x629/0xdd0 [ 1915.097655] ? dquot_get_next_dqblk+0x180/0x180 [ 1915.102355] ext4_mkdir+0x2e1/0xe60 [ 1915.106011] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1915.111561] ? ext4_init_dot_dotdot+0x510/0x510 [ 1915.116251] ? selinux_inode_mkdir+0x22/0x30 [ 1915.120669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1915.126217] ? security_inode_mkdir+0xe8/0x120 [ 1915.130990] vfs_mkdir+0x42e/0x6b0 [ 1915.134547] ovl_create_real+0x225/0x410 [ 1915.138624] ovl_workdir_create+0x564/0x820 [ 1915.142969] ? ovl_mount_dir+0x1c0/0x1c0 [ 1915.147041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1915.152623] ovl_fill_super+0xdd4/0x3f7b [ 1915.156724] ? ovl_show_options+0x550/0x550 [ 1915.161058] ? __free_pages+0x103/0x190 [ 1915.165043] ? selinux_sb_copy_data+0x602/0x740 [ 1915.169735] ? selinux_capable+0x36/0x40 [ 1915.173810] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1915.179363] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1915.184919] ? get_anon_bdev+0xc0/0xc0 [ 1915.188816] ? sget+0x113/0x150 [ 1915.192117] ? ovl_show_options+0x550/0x550 [ 1915.196447] mount_nodev+0x6b/0x110 [ 1915.200088] ovl_mount+0x2c/0x40 [ 1915.203471] mount_fs+0xae/0x31d [ 1915.206865] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1915.211470] ? may_umount+0xb0/0xb0 [ 1915.215106] ? _raw_read_unlock+0x2c/0x50 [ 1915.219266] ? __get_fs_type+0x97/0xc0 [ 1915.223172] do_mount+0x581/0x31f0 [ 1915.226718] ? check_preemption_disabled+0x48/0x280 [ 1915.231751] ? copy_mount_string+0x40/0x40 [ 1915.236015] ? copy_mount_options+0x5f/0x430 [ 1915.240436] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1915.245459] ? kmem_cache_alloc_trace+0x353/0x750 [ 1915.250313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1915.255870] ? _copy_from_user+0xdf/0x150 [ 1915.260041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1915.265589] ? copy_mount_options+0x315/0x430 [ 1915.270099] ksys_mount+0x12d/0x140 [ 1915.273738] __x64_sys_mount+0xbe/0x150 [ 1915.277728] do_syscall_64+0x1b9/0x820 [ 1915.281629] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1915.287009] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1915.291952] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1915.296807] ? trace_hardirqs_on_caller+0x310/0x310 [ 1915.301837] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1915.306896] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1915.311929] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1915.316792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1915.321991] RIP: 0033:0x457569 [ 1915.325200] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1915.344110] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1915.351833] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1915.359147] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1915.366422] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1915.373696] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1915.380972] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:48 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x2]}}]}, 0x80}}, 0x0) [ 1915.395311] overlayfs: failed to create directory ./file1\/work (errno: 12); mounting read-only 03:55:48 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}}, 0x1c) close(r1) 03:55:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xc22}, 0x28) 03:55:48 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x2000000000000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:48 executing program 5 (fault-call:2 fault-nth:34): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x4d7}, 0x28) [ 1915.533310] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x6d2}, 0x28) 03:55:49 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x3f00]}}]}, 0x80}}, 0x0) 03:55:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}}, 0x1c) close(r1) [ 1915.657151] FAULT_INJECTION: forcing a failure. [ 1915.657151] name failslab, interval 1, probability 0, space 0, times 0 [ 1915.696007] CPU: 0 PID: 12478 Comm: syz-executor5 Not tainted 4.19.0+ #79 03:55:49 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x3f00000000000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1915.702970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1915.712335] Call Trace: [ 1915.714951] dump_stack+0x244/0x39d [ 1915.718613] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1915.723832] ? mark_held_locks+0x130/0x130 [ 1915.728121] should_fail.cold.4+0xa/0x17 [ 1915.732217] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1915.737340] ? lock_unpin_lock+0x4a0/0x4a0 [ 1915.741596] ? print_usage_bug+0xc0/0xc0 [ 1915.741612] ? perf_trace_lock+0x14d/0x7a0 [ 1915.741632] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1915.741654] ? zap_class+0x640/0x640 [ 1915.758622] ? zap_class+0x640/0x640 [ 1915.762364] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1915.767925] ? check_preemption_disabled+0x48/0x280 [ 1915.772973] ? __lock_is_held+0xb5/0x140 [ 1915.776028] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1915.777141] ? nfs_lookup_verify_inode+0xc0/0x2b0 [ 1915.777181] ? perf_trace_sched_process_exec+0x860/0x860 [ 1915.797805] ? mark_held_locks+0x130/0x130 [ 1915.802087] __should_failslab+0x124/0x180 [ 1915.806349] should_failslab+0x9/0x14 [ 1915.810174] kmem_cache_alloc+0x2be/0x730 [ 1915.814355] ? debug_smp_processor_id+0x1c/0x20 [ 1915.819054] ? ratelimit_state_init+0xb0/0xb0 [ 1915.823579] ext4_alloc_inode+0xc7/0x870 [ 1915.827669] ? ratelimit_state_init+0xb0/0xb0 [ 1915.832192] ? print_usage_bug+0xc0/0xc0 [ 1915.836284] ? __lock_acquire+0x62f/0x4c20 [ 1915.836504] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1915.840535] ? __getblk_gfp+0x11b/0xd50 03:55:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}}, 0x1c) close(r1) [ 1915.840555] ? zap_class+0x640/0x640 [ 1915.840569] ? zap_class+0x640/0x640 [ 1915.840583] ? perf_trace_lock+0x14d/0x7a0 [ 1915.840600] ? print_usage_bug+0xc0/0xc0 [ 1915.840617] ? print_usage_bug+0xc0/0xc0 [ 1915.840636] ? __lock_acquire+0x62f/0x4c20 [ 1915.878950] ? __lock_acquire+0x62f/0x4c20 [ 1915.883195] ? zap_class+0x640/0x640 [ 1915.886937] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1915.892504] ? ratelimit_state_init+0xb0/0xb0 [ 1915.897024] alloc_inode+0x63/0x190 [ 1915.900678] new_inode_pseudo+0x71/0x1a0 [ 1915.904751] ? prune_icache_sb+0x1c0/0x1c0 [ 1915.909011] new_inode+0x1c/0x40 [ 1915.912406] __ext4_new_inode+0x4cd/0x65b0 [ 1915.916668] ? debug_smp_processor_id+0x1c/0x20 [ 1915.921371] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1915.926966] ? ext4_free_inode+0x1a10/0x1a10 [ 1915.931412] ? debug_smp_processor_id+0x1c/0x20 [ 1915.936075] ? perf_trace_lock+0x14d/0x7a0 [ 1915.940301] ? find_held_lock+0x36/0x1c0 [ 1915.944355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1915.949897] ? lock_is_held_type+0x210/0x210 [ 1915.954298] ? debug_smp_processor_id+0x1c/0x20 [ 1915.958963] ? find_held_lock+0x36/0x1c0 [ 1915.963015] ? zap_class+0x640/0x640 [ 1915.966724] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1915.972263] ? check_preemption_disabled+0x48/0x280 [ 1915.977301] ? find_held_lock+0x36/0x1c0 [ 1915.981387] ? lock_downgrade+0x900/0x900 [ 1915.985543] ? check_preemption_disabled+0x48/0x280 [ 1915.990575] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1915.995514] ? kasan_check_read+0x11/0x20 [ 1915.999671] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1916.004959] ? rcu_softirq_qs+0x20/0x20 [ 1916.008961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1916.014505] ? avc_has_perm+0x55f/0x7e0 [ 1916.018495] ? avc_has_perm_noaudit+0x630/0x630 [ 1916.023182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1916.028729] ? __dquot_initialize+0x629/0xdd0 [ 1916.033250] ? dquot_get_next_dqblk+0x180/0x180 [ 1916.037951] ext4_mkdir+0x2e1/0xe60 [ 1916.041600] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1916.047145] ? ext4_init_dot_dotdot+0x510/0x510 [ 1916.051838] ? selinux_inode_mkdir+0x22/0x30 [ 1916.056274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1916.061822] ? security_inode_mkdir+0xe8/0x120 [ 1916.066432] vfs_mkdir+0x42e/0x6b0 [ 1916.069991] ovl_create_real+0x225/0x410 [ 1916.074067] ovl_workdir_create+0x564/0x820 [ 1916.078562] ? ovl_mount_dir+0x1c0/0x1c0 [ 1916.082631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1916.088211] ovl_fill_super+0xdd4/0x3f7b [ 1916.092313] ? ovl_show_options+0x550/0x550 [ 1916.096645] ? __free_pages+0x103/0x190 [ 1916.100649] ? selinux_sb_copy_data+0x602/0x740 [ 1916.105346] ? selinux_capable+0x36/0x40 [ 1916.109422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1916.114978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1916.120531] ? get_anon_bdev+0xc0/0xc0 [ 1916.124429] ? sget+0x113/0x150 [ 1916.127730] ? ovl_show_options+0x550/0x550 [ 1916.132068] mount_nodev+0x6b/0x110 [ 1916.135709] ovl_mount+0x2c/0x40 [ 1916.139090] mount_fs+0xae/0x31d [ 1916.142478] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1916.147078] ? may_umount+0xb0/0xb0 [ 1916.150716] ? _raw_read_unlock+0x2c/0x50 [ 1916.154882] ? __get_fs_type+0x97/0xc0 [ 1916.158791] do_mount+0x581/0x31f0 [ 1916.162342] ? check_preemption_disabled+0x48/0x280 [ 1916.167394] ? copy_mount_string+0x40/0x40 [ 1916.171656] ? copy_mount_options+0x5f/0x430 [ 1916.176072] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1916.181096] ? kmem_cache_alloc_trace+0x353/0x750 [ 1916.185951] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1916.191504] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1916.197047] ? copy_mount_options+0x315/0x430 [ 1916.201561] ksys_mount+0x12d/0x140 [ 1916.205205] __x64_sys_mount+0xbe/0x150 [ 1916.209213] do_syscall_64+0x1b9/0x820 [ 1916.213115] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1916.218489] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1916.223425] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1916.228278] ? trace_hardirqs_on_caller+0x310/0x310 [ 1916.233303] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1916.238330] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1916.243363] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1916.248227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1916.253423] RIP: 0033:0x457569 [ 1916.256623] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1916.275528] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1916.283245] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1916.290518] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1916.297792] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 03:55:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xf3d}, 0x28) 03:55:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x41b}, 0x28) [ 1916.305068] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1916.312341] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 [ 1916.335165] overlayfs: failed to create directory ./file1\/work (errno: 12); mounting read-only 03:55:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x977}, 0x28) 03:55:49 executing program 5 (fault-call:2 fault-nth:35): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:49 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x1000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:49 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0xf00]}}]}, 0x80}}, 0x0) 03:55:50 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa09}, 0x28) 03:55:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x897}, 0x28) [ 1916.570500] FAULT_INJECTION: forcing a failure. [ 1916.570500] name failslab, interval 1, probability 0, space 0, times 0 [ 1916.591472] CPU: 1 PID: 12517 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1916.598428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1916.607800] Call Trace: [ 1916.610422] dump_stack+0x244/0x39d [ 1916.614090] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1916.619312] ? perf_trace_sched_process_exec+0x860/0x860 [ 1916.624782] ? lock_downgrade+0x900/0x900 [ 1916.628971] should_fail.cold.4+0xa/0x17 [ 1916.633057] ? kasan_check_write+0x14/0x20 [ 1916.637320] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1916.642435] ? print_usage_bug+0xc0/0xc0 [ 1916.646510] ? __ext4_handle_dirty_metadata+0x1e0/0x5a0 [ 1916.651905] ? kasan_check_write+0x14/0x20 [ 1916.656150] ? ext4_mark_iloc_dirty+0x19bb/0x2f00 [ 1916.661014] ? zap_class+0x640/0x640 [ 1916.664760] ? __lock_is_held+0xb5/0x140 [ 1916.668864] ? perf_trace_sched_process_exec+0x860/0x860 [ 1916.674332] ? __lock_acquire+0x62f/0x4c20 [ 1916.678597] __should_failslab+0x124/0x180 [ 1916.682857] should_failslab+0x9/0x14 [ 1916.686674] __kmalloc+0x2d4/0x760 [ 1916.690236] ? ext4_find_extent+0x757/0x9b0 [ 1916.694578] ext4_find_extent+0x757/0x9b0 [ 1916.698760] ext4_ext_map_blocks+0x291/0x48f0 [ 1916.703264] ? kasan_check_write+0x14/0x20 [ 1916.707531] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 1916.712563] ? zap_class+0x640/0x640 [ 1916.716290] ? zap_class+0x640/0x640 [ 1916.720015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1916.725560] ? check_preemption_disabled+0x48/0x280 [ 1916.730617] ? lock_acquire+0x1ed/0x520 [ 1916.734598] ? ext4_map_blocks+0x487/0x1b40 [ 1916.738937] ? lock_release+0xa00/0xa00 [ 1916.742929] ? perf_trace_sched_process_exec+0x860/0x860 [ 1916.748396] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 1916.753077] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1916.758686] ? down_read+0x8d/0x120 [ 1916.762326] ? ext4_map_blocks+0x487/0x1b40 [ 1916.766667] ? __down_interruptible+0x700/0x700 [ 1916.771360] ext4_map_blocks+0xe2d/0x1b40 [ 1916.775544] ? ext4_issue_zeroout+0x190/0x190 [ 1916.780066] ext4_getblk+0x10e/0x630 [ 1916.783797] ? ext4_iomap_begin+0x1390/0x1390 [ 1916.788310] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1916.793866] ? __dquot_initialize+0x629/0xdd0 [ 1916.798385] ext4_bread+0x95/0x2b0 [ 1916.801937] ? ext4_getblk+0x630/0x630 [ 1916.805833] ? dquot_get_next_dqblk+0x180/0x180 [ 1916.810531] ext4_append+0x14e/0x370 [ 1916.814262] ext4_mkdir+0x532/0xe60 [ 1916.817931] ? ext4_init_dot_dotdot+0x510/0x510 [ 1916.822629] ? selinux_inode_mkdir+0x22/0x30 [ 1916.827053] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1916.832600] ? security_inode_mkdir+0xe8/0x120 [ 1916.837199] vfs_mkdir+0x42e/0x6b0 [ 1916.840758] ovl_create_real+0x225/0x410 [ 1916.844836] ovl_workdir_create+0x564/0x820 [ 1916.849190] ? ovl_mount_dir+0x1c0/0x1c0 [ 1916.853265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1916.858861] ovl_fill_super+0xdd4/0x3f7b [ 1916.862963] ? ovl_show_options+0x550/0x550 [ 1916.867293] ? __free_pages+0x103/0x190 [ 1916.871285] ? selinux_sb_copy_data+0x602/0x740 [ 1916.875980] ? selinux_capable+0x36/0x40 [ 1916.880057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1916.885609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1916.891161] ? get_anon_bdev+0xc0/0xc0 [ 1916.895080] ? sget+0x113/0x150 [ 1916.898381] ? ovl_show_options+0x550/0x550 [ 1916.902716] mount_nodev+0x6b/0x110 [ 1916.906403] ovl_mount+0x2c/0x40 [ 1916.909785] mount_fs+0xae/0x31d [ 1916.913168] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1916.917763] ? may_umount+0xb0/0xb0 [ 1916.921407] ? _raw_read_unlock+0x3f/0x50 [ 1916.925563] ? __get_fs_type+0x97/0xc0 [ 1916.929467] do_mount+0x581/0x31f0 [ 1916.933019] ? check_preemption_disabled+0x48/0x280 [ 1916.938057] ? copy_mount_string+0x40/0x40 [ 1916.942321] ? copy_mount_options+0x5f/0x430 [ 1916.946741] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1916.951770] ? kmem_cache_alloc_trace+0x353/0x750 [ 1916.956627] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1916.962186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1916.967906] ? copy_mount_options+0x315/0x430 [ 1916.972428] ksys_mount+0x12d/0x140 [ 1916.976074] __x64_sys_mount+0xbe/0x150 [ 1916.980067] do_syscall_64+0x1b9/0x820 [ 1916.983968] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1916.989345] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1916.994287] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1916.999138] ? trace_hardirqs_on_caller+0x310/0x310 [ 1917.004166] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1917.009194] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1917.014226] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1917.019092] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1917.024289] RIP: 0033:0x457569 [ 1917.027491] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1917.046402] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1917.054123] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1917.061403] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 03:55:50 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x1000000]}}]}, 0x80}}, 0x0) [ 1917.068683] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1917.076297] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1917.083570] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:50 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xf57}, 0x28) 03:55:50 executing program 5 (fault-call:2 fault-nth:36): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50]}}, 0x1c) close(r1) 03:55:50 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x200000000000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x135e}, 0x28) [ 1917.291007] FAULT_INJECTION: forcing a failure. [ 1917.291007] name failslab, interval 1, probability 0, space 0, times 0 [ 1917.302920] CPU: 1 PID: 12542 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1917.309877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1917.319250] Call Trace: [ 1917.321878] dump_stack+0x244/0x39d [ 1917.325540] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1917.330786] should_fail.cold.4+0xa/0x17 [ 1917.334891] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1917.340031] ? mark_held_locks+0x130/0x130 [ 1917.344296] ? find_held_lock+0x36/0x1c0 [ 1917.348395] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1917.353948] ? check_preemption_disabled+0x48/0x280 [ 1917.358986] ? debug_smp_processor_id+0x1c/0x20 [ 1917.363687] ? perf_trace_lock+0x14d/0x7a0 [ 1917.367931] ? check_preemption_disabled+0x48/0x280 [ 1917.372969] ? lock_is_held_type+0x210/0x210 [ 1917.377399] ? rcu_softirq_qs+0x20/0x20 [ 1917.381396] ? rcu_softirq_qs+0x20/0x20 [ 1917.385387] ? unwind_dump+0x190/0x190 [ 1917.389286] ? zap_class+0x640/0x640 [ 1917.393019] ? is_bpf_text_address+0xd3/0x170 [ 1917.397534] __should_failslab+0x124/0x180 [ 1917.401803] should_failslab+0x9/0x14 [ 1917.405612] kmem_cache_alloc+0x47/0x730 [ 1917.409697] ? __es_tree_search.isra.12+0x1ba/0x220 [ 1917.414734] __es_insert_extent+0x30c/0x1120 [ 1917.419167] ? ext4_es_free_extent+0x790/0x790 [ 1917.423760] ? kasan_check_read+0x11/0x20 [ 1917.427920] ? do_raw_write_lock+0x14f/0x310 [ 1917.432352] ? do_raw_read_unlock+0x70/0x70 [ 1917.436691] ? __lock_is_held+0xb5/0x140 [ 1917.440783] ext4_es_insert_extent+0x316/0x810 [ 1917.445389] ? ext4_es_find_delayed_extent_range+0xd80/0xd80 [ 1917.451205] ? __lock_is_held+0xb5/0x140 [ 1917.455291] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1917.460338] ext4_ext_put_gap_in_cache+0x158/0x1f0 [ 1917.465284] ? ext4_zeroout_es+0x160/0x160 [ 1917.469533] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1917.475095] ext4_ext_map_blocks+0x1da5/0x48f0 [ 1917.479700] ? kasan_check_write+0x14/0x20 [ 1917.483964] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 1917.488994] ? zap_class+0x640/0x640 [ 1917.492716] ? zap_class+0x640/0x640 [ 1917.496442] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1917.501988] ? check_preemption_disabled+0x48/0x280 [ 1917.507036] ? lock_acquire+0x1ed/0x520 [ 1917.511022] ? ext4_map_blocks+0x487/0x1b40 [ 1917.515362] ? lock_release+0xa00/0xa00 [ 1917.519354] ? perf_trace_sched_process_exec+0x860/0x860 [ 1917.524818] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 1917.529511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1917.535073] ? down_read+0x8d/0x120 [ 1917.538705] ? ext4_map_blocks+0x487/0x1b40 [ 1917.543041] ? __down_interruptible+0x700/0x700 [ 1917.547734] ext4_map_blocks+0xe2d/0x1b40 [ 1917.551927] ? ext4_issue_zeroout+0x190/0x190 [ 1917.556453] ext4_getblk+0x10e/0x630 [ 1917.560187] ? ext4_iomap_begin+0x1390/0x1390 [ 1917.564696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1917.570243] ? __dquot_initialize+0x629/0xdd0 [ 1917.574772] ext4_bread+0x95/0x2b0 [ 1917.578325] ? ext4_getblk+0x630/0x630 [ 1917.582223] ? dquot_get_next_dqblk+0x180/0x180 [ 1917.586918] ext4_append+0x14e/0x370 [ 1917.590650] ext4_mkdir+0x532/0xe60 [ 1917.594305] ? ext4_init_dot_dotdot+0x510/0x510 [ 1917.598997] ? selinux_inode_mkdir+0x22/0x30 [ 1917.603414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1917.608962] ? security_inode_mkdir+0xe8/0x120 [ 1917.613566] vfs_mkdir+0x42e/0x6b0 [ 1917.617163] ovl_create_real+0x225/0x410 [ 1917.621261] ovl_workdir_create+0x564/0x820 [ 1917.625607] ? ovl_mount_dir+0x1c0/0x1c0 [ 1917.629676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1917.635259] ovl_fill_super+0xdd4/0x3f7b [ 1917.639357] ? ovl_show_options+0x550/0x550 [ 1917.643690] ? __free_pages+0x103/0x190 [ 1917.647677] ? selinux_sb_copy_data+0x602/0x740 [ 1917.652371] ? selinux_capable+0x36/0x40 [ 1917.656452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1917.662004] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1917.667559] ? get_anon_bdev+0xc0/0xc0 [ 1917.671456] ? sget+0x113/0x150 [ 1917.674750] ? ovl_show_options+0x550/0x550 [ 1917.679084] mount_nodev+0x6b/0x110 [ 1917.682732] ovl_mount+0x2c/0x40 [ 1917.686115] mount_fs+0xae/0x31d [ 1917.689502] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1917.694103] ? may_umount+0xb0/0xb0 [ 1917.697741] ? _raw_read_unlock+0x2c/0x50 [ 1917.701897] ? __get_fs_type+0x97/0xc0 [ 1917.705803] do_mount+0x581/0x31f0 [ 1917.709356] ? check_preemption_disabled+0x48/0x280 [ 1917.714402] ? copy_mount_string+0x40/0x40 [ 1917.718662] ? copy_mount_options+0x5f/0x430 [ 1917.723080] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1917.728110] ? kmem_cache_alloc_trace+0x353/0x750 [ 1917.732964] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1917.738510] ? _copy_from_user+0xdf/0x150 [ 1917.742669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1917.748220] ? copy_mount_options+0x315/0x430 [ 1917.752739] ksys_mount+0x12d/0x140 [ 1917.756385] __x64_sys_mount+0xbe/0x150 [ 1917.760382] do_syscall_64+0x1b9/0x820 [ 1917.764290] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1917.769671] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1917.774620] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1917.779484] ? trace_hardirqs_on_caller+0x310/0x310 [ 1917.784517] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1917.789545] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1917.794576] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1917.799448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1917.804646] RIP: 0033:0x457569 [ 1917.807860] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1917.826772] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1917.834492] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 03:55:51 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x326}, 0x28) 03:55:51 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0xf00]}}]}, 0x80}}, 0x0) [ 1917.841766] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1917.849045] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1917.856326] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1917.863600] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:51 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xffffff7f]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xf4e}, 0x28) 03:55:51 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x500]}}]}, 0x80}}, 0x0) 03:55:51 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa73}, 0x28) 03:55:51 executing program 5 (fault-call:2 fault-nth:37): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:51 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x2000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1233}, 0x28) 03:55:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}, 0x1c) close(r1) 03:55:51 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xf70}, 0x28) [ 1918.123672] FAULT_INJECTION: forcing a failure. [ 1918.123672] name failslab, interval 1, probability 0, space 0, times 0 [ 1918.203380] CPU: 0 PID: 12569 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1918.210373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1918.219739] Call Trace: [ 1918.222349] dump_stack+0x244/0x39d [ 1918.226008] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1918.231229] ? rcu_softirq_qs+0x20/0x20 [ 1918.235243] should_fail.cold.4+0xa/0x17 [ 1918.239341] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1918.244476] ? kernel_text_address+0x79/0xf0 [ 1918.248899] ? __kernel_text_address+0xd/0x40 [ 1918.253407] ? __save_stack_trace+0x8d/0xf0 [ 1918.257740] ? zap_class+0x640/0x640 [ 1918.261484] ? __lock_is_held+0xb5/0x140 [ 1918.265550] ? print_usage_bug+0xc0/0xc0 [ 1918.269628] ? mount_fs+0xae/0x31d [ 1918.273193] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1918.278586] ? perf_trace_sched_process_exec+0x860/0x860 [ 1918.284049] ? __lock_acquire+0x62f/0x4c20 [ 1918.288305] __should_failslab+0x124/0x180 [ 1918.292549] should_failslab+0x9/0x14 [ 1918.296358] __kmalloc+0x2d4/0x760 [ 1918.299931] ? ext4_find_extent+0x757/0x9b0 [ 1918.304266] ext4_find_extent+0x757/0x9b0 [ 1918.308442] ext4_ext_map_blocks+0x291/0x48f0 [ 1918.312944] ? perf_trace_lock+0x14d/0x7a0 [ 1918.317185] ? kasan_check_write+0x14/0x20 [ 1918.321432] ? lock_is_held_type+0x210/0x210 [ 1918.325862] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 1918.330901] ? zap_class+0x640/0x640 [ 1918.334620] ? zap_class+0x640/0x640 [ 1918.338343] ? zap_class+0x640/0x640 [ 1918.342075] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1918.347621] ? check_preemption_disabled+0x48/0x280 [ 1918.352671] ? lock_acquire+0x1ed/0x520 [ 1918.356650] ? ext4_map_blocks+0x88f/0x1b40 [ 1918.360987] ? lock_release+0xa00/0xa00 [ 1918.364968] ? perf_trace_sched_process_exec+0x860/0x860 [ 1918.370422] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 1918.375117] ? down_write+0x8a/0x130 [ 1918.378835] ? ext4_map_blocks+0x88f/0x1b40 [ 1918.383174] ? down_read+0x120/0x120 [ 1918.386925] ext4_map_blocks+0x8f7/0x1b40 [ 1918.391095] ? ext4_issue_zeroout+0x190/0x190 [ 1918.395614] ext4_getblk+0x10e/0x630 [ 1918.399344] ? ext4_iomap_begin+0x1390/0x1390 [ 1918.403856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1918.409409] ? __dquot_initialize+0x629/0xdd0 [ 1918.413918] ext4_bread+0x95/0x2b0 [ 1918.417480] ? ext4_getblk+0x630/0x630 [ 1918.421408] ? dquot_get_next_dqblk+0x180/0x180 [ 1918.426134] ext4_append+0x14e/0x370 [ 1918.429882] ext4_mkdir+0x532/0xe60 [ 1918.433530] ? ext4_init_dot_dotdot+0x510/0x510 [ 1918.438221] ? selinux_inode_mkdir+0x22/0x30 [ 1918.442638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1918.448182] ? security_inode_mkdir+0xe8/0x120 [ 1918.452778] vfs_mkdir+0x42e/0x6b0 [ 1918.456333] ovl_create_real+0x225/0x410 [ 1918.460409] ovl_workdir_create+0x564/0x820 [ 1918.464747] ? ovl_mount_dir+0x1c0/0x1c0 [ 1918.468814] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1918.474397] ovl_fill_super+0xdd4/0x3f7b [ 1918.478490] ? ovl_show_options+0x550/0x550 [ 1918.482827] ? __free_pages+0x103/0x190 [ 1918.486816] ? selinux_sb_copy_data+0x602/0x740 [ 1918.491515] ? selinux_capable+0x36/0x40 [ 1918.495583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1918.501133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1918.506684] ? get_anon_bdev+0xc0/0xc0 [ 1918.510577] ? sget+0x113/0x150 [ 1918.513881] ? ovl_show_options+0x550/0x550 [ 1918.518213] mount_nodev+0x6b/0x110 [ 1918.521859] ovl_mount+0x2c/0x40 [ 1918.525241] mount_fs+0xae/0x31d [ 1918.528642] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1918.533235] ? may_umount+0xb0/0xb0 [ 1918.536890] ? _raw_read_unlock+0x2c/0x50 [ 1918.541050] ? __get_fs_type+0x97/0xc0 [ 1918.544973] do_mount+0x581/0x31f0 [ 1918.548524] ? trace_hardirqs_on+0x310/0x310 [ 1918.552949] ? copy_mount_string+0x40/0x40 [ 1918.557200] ? retint_kernel+0x2d/0x2d [ 1918.561108] ? copy_mount_options+0x25c/0x430 [ 1918.565615] ? write_comp_data+0x1/0x70 [ 1918.569597] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1918.575143] ? copy_mount_options+0x315/0x430 [ 1918.579650] ksys_mount+0x12d/0x140 [ 1918.583288] __x64_sys_mount+0xbe/0x150 [ 1918.587274] do_syscall_64+0x1b9/0x820 [ 1918.591188] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1918.596561] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1918.601495] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1918.606344] ? trace_hardirqs_on_caller+0x310/0x310 [ 1918.611397] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1918.616433] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1918.621552] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1918.626413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1918.631605] RIP: 0033:0x457569 [ 1918.634804] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:55:52 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x2000]}}]}, 0x80}}, 0x0) [ 1918.653708] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1918.661449] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1918.668720] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1918.675992] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1918.683263] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1918.690534] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:52 executing program 5 (fault-call:2 fault-nth:38): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:52 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xcf4}, 0x28) [ 1918.702241] overlayfs: failed to create directory ./file1\/work (errno: 12); mounting read-only 03:55:52 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x400300]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x12c0}, 0x28) 03:55:52 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}}]}, 0x80}}, 0x0) [ 1918.870890] FAULT_INJECTION: forcing a failure. [ 1918.870890] name failslab, interval 1, probability 0, space 0, times 0 [ 1918.900325] CPU: 0 PID: 12596 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1918.907282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1918.916647] Call Trace: [ 1918.919252] dump_stack+0x244/0x39d [ 1918.922913] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1918.928119] ? rcu_softirq_qs+0x20/0x20 [ 1918.932113] should_fail.cold.4+0xa/0x17 [ 1918.936190] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1918.941299] ? kernel_text_address+0x79/0xf0 [ 1918.945716] ? __kernel_text_address+0xd/0x40 [ 1918.950236] ? __save_stack_trace+0x8d/0xf0 [ 1918.954565] ? zap_class+0x640/0x640 [ 1918.958308] ? __lock_is_held+0xb5/0x140 [ 1918.962395] ? print_usage_bug+0xc0/0xc0 [ 1918.966486] ? mount_fs+0xae/0x31d [ 1918.970538] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1918.975921] ? perf_trace_sched_process_exec+0x860/0x860 [ 1918.981380] ? __lock_acquire+0x62f/0x4c20 [ 1918.985639] __should_failslab+0x124/0x180 [ 1918.989898] should_failslab+0x9/0x14 [ 1918.993723] __kmalloc+0x2d4/0x760 [ 1918.997281] ? ext4_find_extent+0x757/0x9b0 [ 1919.001616] ext4_find_extent+0x757/0x9b0 [ 1919.005788] ext4_ext_map_blocks+0x291/0x48f0 [ 1919.010318] ? perf_trace_lock+0x14d/0x7a0 [ 1919.014572] ? kasan_check_write+0x14/0x20 [ 1919.018822] ? lock_is_held_type+0x210/0x210 [ 1919.023339] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 1919.028365] ? zap_class+0x640/0x640 [ 1919.032097] ? zap_class+0x640/0x640 [ 1919.035815] ? zap_class+0x640/0x640 [ 1919.039547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.045095] ? check_preemption_disabled+0x48/0x280 [ 1919.050140] ? lock_acquire+0x1ed/0x520 [ 1919.054122] ? ext4_map_blocks+0x88f/0x1b40 [ 1919.058499] ? lock_release+0xa00/0xa00 [ 1919.062478] ? perf_trace_sched_process_exec+0x860/0x860 [ 1919.067934] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 1919.072646] ? down_write+0x8a/0x130 [ 1919.076362] ? ext4_map_blocks+0x88f/0x1b40 [ 1919.080703] ? down_read+0x120/0x120 [ 1919.084435] ext4_map_blocks+0x8f7/0x1b40 [ 1919.088605] ? ext4_issue_zeroout+0x190/0x190 [ 1919.093128] ext4_getblk+0x10e/0x630 [ 1919.096863] ? ext4_iomap_begin+0x1390/0x1390 [ 1919.101380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.106926] ? __dquot_initialize+0x629/0xdd0 [ 1919.111433] ext4_bread+0x95/0x2b0 [ 1919.114983] ? ext4_getblk+0x630/0x630 [ 1919.118902] ? dquot_get_next_dqblk+0x180/0x180 [ 1919.123590] ext4_append+0x14e/0x370 [ 1919.127317] ext4_mkdir+0x532/0xe60 [ 1919.130965] ? ext4_init_dot_dotdot+0x510/0x510 [ 1919.135659] ? selinux_inode_mkdir+0x22/0x30 [ 1919.140078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.145636] ? security_inode_mkdir+0xe8/0x120 [ 1919.150232] vfs_mkdir+0x42e/0x6b0 [ 1919.153789] ovl_create_real+0x225/0x410 [ 1919.157871] ovl_workdir_create+0x564/0x820 [ 1919.162222] ? ovl_mount_dir+0x1c0/0x1c0 [ 1919.166287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.171872] ovl_fill_super+0xdd4/0x3f7b [ 1919.175974] ? ovl_show_options+0x550/0x550 [ 1919.180300] ? __free_pages+0x103/0x190 [ 1919.184282] ? selinux_sb_copy_data+0x602/0x740 [ 1919.188976] ? selinux_capable+0x36/0x40 [ 1919.193044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.198595] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.204147] ? get_anon_bdev+0xc0/0xc0 [ 1919.208039] ? sget+0x113/0x150 [ 1919.211341] ? ovl_show_options+0x550/0x550 [ 1919.215669] mount_nodev+0x6b/0x110 [ 1919.219305] ovl_mount+0x2c/0x40 [ 1919.222689] mount_fs+0xae/0x31d [ 1919.226074] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1919.230670] ? may_umount+0xb0/0xb0 [ 1919.234303] ? _raw_read_unlock+0x2c/0x50 [ 1919.238457] ? __get_fs_type+0x97/0xc0 [ 1919.242360] do_mount+0x581/0x31f0 [ 1919.245911] ? check_preemption_disabled+0x48/0x280 [ 1919.250963] ? copy_mount_string+0x40/0x40 [ 1919.255224] ? copy_mount_options+0x5f/0x430 [ 1919.259637] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1919.264663] ? kmem_cache_alloc_trace+0x353/0x750 [ 1919.269535] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1919.275087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.280633] ? copy_mount_options+0x315/0x430 [ 1919.285146] ksys_mount+0x12d/0x140 [ 1919.288786] __x64_sys_mount+0xbe/0x150 [ 1919.292774] do_syscall_64+0x1b9/0x820 [ 1919.296669] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1919.302059] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1919.307005] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1919.311867] ? trace_hardirqs_on_caller+0x310/0x310 [ 1919.316912] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1919.321939] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1919.326972] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1919.331834] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1919.337041] RIP: 0033:0x457569 [ 1919.340244] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1919.359148] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:55:52 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x96f}, 0x28) [ 1919.366869] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1919.374235] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1919.381507] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1919.388777] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1919.396066] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 [ 1919.418774] overlayfs: failed to create directory ./file1\/work (errno: 12); mounting read-only 03:55:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f000000000000]}}, 0x1c) close(r1) 03:55:52 executing program 5 (fault-call:2 fault-nth:39): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:52 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0xa0010000]}}]}, 0x80}}, 0x0) 03:55:52 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x20000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xb02}, 0x28) 03:55:53 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x21b}, 0x28) [ 1919.538456] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0008000]}}, 0x1c) close(r1) [ 1919.605270] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1919.671077] FAULT_INJECTION: forcing a failure. [ 1919.671077] name failslab, interval 1, probability 0, space 0, times 0 [ 1919.682643] CPU: 1 PID: 12630 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1919.689587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1919.698954] Call Trace: [ 1919.701581] dump_stack+0x244/0x39d [ 1919.705225] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1919.710439] should_fail.cold.4+0xa/0x17 [ 1919.714517] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1919.719629] ? ovl_create_real+0x225/0x410 [ 1919.723894] ? mark_held_locks+0x130/0x130 [ 1919.728150] ? zap_class+0x640/0x640 [ 1919.731877] ? mark_held_locks+0xc7/0x130 [ 1919.736040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.741585] ? check_preemption_disabled+0x48/0x280 [ 1919.746619] ? __lock_is_held+0xb5/0x140 [ 1919.750703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.756249] ? ext4_ext_map_blocks+0xee9/0x48f0 [ 1919.760937] __should_failslab+0x124/0x180 [ 1919.765180] should_failslab+0x9/0x14 [ 1919.768990] kmem_cache_alloc+0x47/0x730 [ 1919.773055] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1919.778080] ? ext4_es_can_be_merged+0x23d/0x2a0 [ 1919.782855] ? __es_tree_search.isra.12+0x1ba/0x220 [ 1919.787899] __es_insert_extent+0x30c/0x1120 [ 1919.792336] ? ext4_es_free_extent+0x790/0x790 [ 1919.796934] ? do_raw_write_lock+0x14f/0x310 [ 1919.801356] ? do_raw_read_unlock+0x70/0x70 [ 1919.805688] ? __lock_is_held+0xb5/0x140 [ 1919.809777] ext4_es_insert_extent+0x316/0x810 [ 1919.814380] ? ext4_es_find_delayed_extent_range+0xd80/0xd80 [ 1919.820201] ? down_write+0x8a/0x130 [ 1919.823920] ? ext4_map_blocks+0x88f/0x1b40 [ 1919.828251] ? down_read+0x120/0x120 [ 1919.832009] ext4_map_blocks+0xb0c/0x1b40 [ 1919.836182] ? ext4_issue_zeroout+0x190/0x190 [ 1919.840702] ext4_getblk+0x10e/0x630 [ 1919.844448] ? ext4_iomap_begin+0x1390/0x1390 [ 1919.848956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.854508] ? __dquot_initialize+0x629/0xdd0 [ 1919.859041] ext4_bread+0x95/0x2b0 [ 1919.862592] ? ext4_getblk+0x630/0x630 [ 1919.866486] ? dquot_get_next_dqblk+0x180/0x180 [ 1919.871176] ext4_append+0x14e/0x370 [ 1919.874907] ext4_mkdir+0x532/0xe60 [ 1919.878563] ? ext4_init_dot_dotdot+0x510/0x510 [ 1919.883255] ? selinux_inode_mkdir+0x22/0x30 [ 1919.887669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.893215] ? security_inode_mkdir+0xe8/0x120 [ 1919.897813] vfs_mkdir+0x42e/0x6b0 [ 1919.901387] ovl_create_real+0x225/0x410 [ 1919.905465] ovl_workdir_create+0x564/0x820 [ 1919.909808] ? ovl_mount_dir+0x1c0/0x1c0 [ 1919.913886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.919472] ovl_fill_super+0xdd4/0x3f7b [ 1919.923568] ? ovl_show_options+0x550/0x550 [ 1919.927898] ? __free_pages+0x103/0x190 [ 1919.931896] ? selinux_sb_copy_data+0x602/0x740 [ 1919.936589] ? selinux_capable+0x36/0x40 [ 1919.940661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.946214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.951768] ? get_anon_bdev+0xc0/0xc0 [ 1919.955667] ? sget+0x113/0x150 [ 1919.958961] ? ovl_show_options+0x550/0x550 [ 1919.963297] mount_nodev+0x6b/0x110 [ 1919.966946] ovl_mount+0x2c/0x40 [ 1919.970330] mount_fs+0xae/0x31d [ 1919.973715] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1919.978309] ? may_umount+0xb0/0xb0 [ 1919.981946] ? _raw_read_unlock+0x2c/0x50 [ 1919.986101] ? __get_fs_type+0x97/0xc0 [ 1919.990010] do_mount+0x581/0x31f0 [ 1919.993559] ? check_preemption_disabled+0x48/0x280 [ 1919.998598] ? copy_mount_string+0x40/0x40 [ 1920.002868] ? copy_mount_options+0x5f/0x430 [ 1920.007290] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1920.012320] ? kmem_cache_alloc_trace+0x353/0x750 [ 1920.017176] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1920.022728] ? _copy_from_user+0xdf/0x150 [ 1920.026893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1920.032444] ? copy_mount_options+0x315/0x430 [ 1920.036956] ksys_mount+0x12d/0x140 [ 1920.040599] __x64_sys_mount+0xbe/0x150 [ 1920.044591] do_syscall_64+0x1b9/0x820 [ 1920.048491] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1920.053880] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1920.058823] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1920.063689] ? trace_hardirqs_on_caller+0x310/0x310 [ 1920.068720] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1920.073752] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1920.079280] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1920.084167] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1920.089380] RIP: 0033:0x457569 [ 1920.092583] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1920.111490] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:55:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1335}, 0x28) 03:55:53 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x80c}, 0x28) [ 1920.119208] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1920.126484] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1920.133763] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1920.141039] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1920.148316] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:53 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xffffffffa0010000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:53 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}]}, 0x80}}, 0x0) [ 1920.188839] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:53 executing program 5 (fault-call:2 fault-nth:40): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 1920.259427] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x91ffffff]}}, 0x1c) close(r1) 03:55:53 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x11d4}, 0x28) 03:55:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xc71}, 0x28) 03:55:53 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x1a0ffffffff]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:53 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}]}, 0x80}}, 0x0) [ 1920.452457] FAULT_INJECTION: forcing a failure. [ 1920.452457] name failslab, interval 1, probability 0, space 0, times 0 [ 1920.506721] CPU: 1 PID: 12657 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1920.513701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1920.523074] Call Trace: [ 1920.525702] dump_stack+0x244/0x39d [ 1920.529371] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1920.534602] ? debug_smp_processor_id+0x1c/0x20 [ 1920.539301] ? perf_trace_lock+0x14d/0x7a0 [ 1920.543569] should_fail.cold.4+0xa/0x17 [ 1920.547650] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1920.552781] ? zap_class+0x640/0x640 [ 1920.556512] ? kasan_kmalloc+0xc7/0xe0 [ 1920.560411] ? kasan_slab_alloc+0x12/0x20 [ 1920.564576] ? kmem_cache_alloc+0x12e/0x730 [ 1920.568903] ? __alloc_file+0xa8/0x470 [ 1920.572796] ? alloc_empty_file+0x72/0x170 [ 1920.577051] ? find_held_lock+0x36/0x1c0 [ 1920.581128] ? __lock_is_held+0xb5/0x140 [ 1920.585218] ? perf_trace_sched_process_exec+0x860/0x860 [ 1920.590687] ? check_preemption_disabled+0x48/0x280 [ 1920.595729] __should_failslab+0x124/0x180 [ 1920.599978] should_failslab+0x9/0x14 [ 1920.603785] kmem_cache_alloc+0x2be/0x730 [ 1920.607982] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1920.613014] selinux_file_alloc_security+0xb4/0x190 [ 1920.618049] security_file_alloc+0x4c/0xa0 [ 1920.622298] __alloc_file+0x12a/0x470 [ 1920.626111] ? file_free_rcu+0xd0/0xd0 [ 1920.630012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1920.635568] ? notify_change+0x792/0x1110 [ 1920.639736] ? up_write+0x7b/0x220 [ 1920.643294] ? down_write_nested+0x130/0x130 [ 1920.647726] alloc_empty_file+0x72/0x170 [ 1920.651803] dentry_open+0x71/0x1d0 [ 1920.655440] ovl_path_open+0x58/0x70 [ 1920.659171] ovl_check_d_type_supported+0x109/0x480 [ 1920.664196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1920.669749] ? ovl_cleanup_whiteouts+0x2a0/0x2a0 [ 1920.674527] ? ovl_dir_fsync+0x4f0/0x4f0 [ 1920.678637] ovl_fill_super+0xe12/0x3f7b [ 1920.682741] ? ovl_show_options+0x550/0x550 [ 1920.687075] ? __free_pages+0x103/0x190 [ 1920.691062] ? selinux_sb_copy_data+0x602/0x740 [ 1920.695757] ? selinux_capable+0x36/0x40 [ 1920.699832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1920.705400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1920.710958] ? get_anon_bdev+0xc0/0xc0 [ 1920.714866] ? sget+0x113/0x150 [ 1920.718167] ? ovl_show_options+0x550/0x550 [ 1920.722498] mount_nodev+0x6b/0x110 [ 1920.726139] ovl_mount+0x2c/0x40 [ 1920.729524] mount_fs+0xae/0x31d [ 1920.732912] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1920.737507] ? may_umount+0xb0/0xb0 [ 1920.741146] ? _raw_read_unlock+0x2c/0x50 [ 1920.745303] ? __get_fs_type+0x97/0xc0 [ 1920.749211] do_mount+0x581/0x31f0 [ 1920.752759] ? retint_kernel+0x1b/0x2d [ 1920.756660] ? trace_hardirqs_on+0x310/0x310 [ 1920.761088] ? copy_mount_string+0x40/0x40 [ 1920.765337] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1920.770126] ? retint_kernel+0x2d/0x2d [ 1920.774041] ? copy_mount_options+0x239/0x430 [ 1920.778551] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 1920.783411] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1920.788962] ? copy_mount_options+0x315/0x430 [ 1920.793483] ksys_mount+0x12d/0x140 [ 1920.797131] __x64_sys_mount+0xbe/0x150 [ 1920.801121] do_syscall_64+0x1b9/0x820 [ 1920.805020] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1920.810411] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1920.815349] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1920.820214] ? trace_hardirqs_on_caller+0x310/0x310 [ 1920.825252] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1920.830285] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1920.835318] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1920.840183] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1920.845389] RIP: 0033:0x457569 [ 1920.848593] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1920.867514] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1920.875241] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1920.882522] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1920.889804] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1920.897093] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 03:55:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x429}, 0x28) [ 1920.904373] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x12dc}, 0x28) 03:55:54 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1138}, 0x28) 03:55:54 executing program 5 (fault-call:2 fault-nth:41): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:54 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xefffffff00000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:54 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x400300]}}]}, 0x80}}, 0x0) [ 1921.109893] FAULT_INJECTION: forcing a failure. [ 1921.109893] name failslab, interval 1, probability 0, space 0, times 0 [ 1921.121329] CPU: 1 PID: 12681 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1921.128279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1921.138171] Call Trace: [ 1921.140789] dump_stack+0x244/0x39d [ 1921.144449] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1921.149687] should_fail.cold.4+0xa/0x17 [ 1921.153781] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1921.158909] ? ovl_create_real+0x225/0x410 [ 1921.163176] ? mark_held_locks+0x130/0x130 [ 1921.167450] ? zap_class+0x640/0x640 [ 1921.171189] ? mark_held_locks+0xc7/0x130 [ 1921.175384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1921.180951] ? check_preemption_disabled+0x48/0x280 [ 1921.186008] ? __lock_is_held+0xb5/0x140 [ 1921.190105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1921.195667] ? ext4_ext_map_blocks+0xee9/0x48f0 [ 1921.200495] __should_failslab+0x124/0x180 [ 1921.204832] should_failslab+0x9/0x14 [ 1921.208694] kmem_cache_alloc+0x47/0x730 [ 1921.212766] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1921.217796] ? ext4_es_can_be_merged+0x23d/0x2a0 [ 1921.222574] ? __es_tree_search.isra.12+0x1ba/0x220 [ 1921.227626] __es_insert_extent+0x30c/0x1120 [ 1921.232081] ? ext4_es_free_extent+0x790/0x790 [ 1921.236809] ? do_raw_write_lock+0x14f/0x310 [ 1921.241244] ? do_raw_read_unlock+0x70/0x70 [ 1921.245578] ? __lock_is_held+0xb5/0x140 [ 1921.249670] ext4_es_insert_extent+0x316/0x810 [ 1921.254271] ? ext4_es_find_delayed_extent_range+0xd80/0xd80 [ 1921.260096] ? down_write+0x8a/0x130 [ 1921.263818] ? ext4_map_blocks+0x88f/0x1b40 [ 1921.268306] ? down_read+0x120/0x120 [ 1921.272048] ext4_map_blocks+0xb0c/0x1b40 [ 1921.276237] ? ext4_issue_zeroout+0x190/0x190 [ 1921.280761] ext4_getblk+0x10e/0x630 [ 1921.284613] ? ext4_iomap_begin+0x1390/0x1390 [ 1921.289593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1921.295142] ? __dquot_initialize+0x629/0xdd0 [ 1921.299659] ext4_bread+0x95/0x2b0 [ 1921.303219] ? ext4_getblk+0x630/0x630 [ 1921.307119] ? dquot_get_next_dqblk+0x180/0x180 [ 1921.311814] ext4_append+0x14e/0x370 [ 1921.315560] ext4_mkdir+0x532/0xe60 [ 1921.319415] ? ext4_init_dot_dotdot+0x510/0x510 [ 1921.324107] ? selinux_inode_mkdir+0x22/0x30 [ 1921.328534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1921.334542] ? security_inode_mkdir+0xe8/0x120 [ 1921.339148] vfs_mkdir+0x42e/0x6b0 [ 1921.342705] ovl_create_real+0x225/0x410 [ 1921.346817] ovl_workdir_create+0x564/0x820 [ 1921.351170] ? ovl_mount_dir+0x1c0/0x1c0 [ 1921.355238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1921.360917] ovl_fill_super+0xdd4/0x3f7b [ 1921.365612] ? ovl_show_options+0x550/0x550 [ 1921.369942] ? __free_pages+0x103/0x190 [ 1921.373928] ? selinux_sb_copy_data+0x602/0x740 [ 1921.378625] ? selinux_capable+0x36/0x40 [ 1921.382695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1921.388244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1921.393811] ? get_anon_bdev+0xc0/0xc0 [ 1921.397923] ? sget+0x113/0x150 [ 1921.401222] ? ovl_show_options+0x550/0x550 [ 1921.406017] mount_nodev+0x6b/0x110 [ 1921.409660] ovl_mount+0x2c/0x40 [ 1921.413049] mount_fs+0xae/0x31d [ 1921.416553] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1921.421731] ? may_umount+0xb0/0xb0 [ 1921.425368] ? _raw_read_unlock+0x2c/0x50 [ 1921.429534] ? __get_fs_type+0x97/0xc0 [ 1921.433441] do_mount+0x581/0x31f0 [ 1921.436991] ? check_preemption_disabled+0x48/0x280 [ 1921.442026] ? copy_mount_string+0x40/0x40 [ 1921.446290] ? copy_mount_options+0x5f/0x430 [ 1921.450707] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1921.455735] ? kmem_cache_alloc_trace+0x353/0x750 [ 1921.460590] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1921.466144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1921.471697] ? copy_mount_options+0x315/0x430 [ 1921.476218] ksys_mount+0x12d/0x140 [ 1921.479881] __x64_sys_mount+0xbe/0x150 [ 1921.483891] do_syscall_64+0x1b9/0x820 [ 1921.487796] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1921.493177] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1921.498118] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1921.502975] ? trace_hardirqs_on_caller+0x310/0x310 [ 1921.508006] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1921.513038] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1921.518073] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1921.522937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1921.528134] RIP: 0033:0x457569 [ 1921.531339] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1921.550361] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:55:54 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xee7}, 0x28) 03:55:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x5c7}, 0x28) 03:55:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8004000000000000]}}, 0x1c) close(r1) [ 1921.558089] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1921.565524] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1921.573425] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1921.580698] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1921.587973] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xd9}, 0x28) 03:55:55 executing program 5 (fault-call:2 fault-nth:42): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x13cd}, 0x28) 03:55:55 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x400000000000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1921.726576] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:55:55 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0xf000000]}}]}, 0x80}}, 0x0) 03:55:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}, 0x1c) close(r1) 03:55:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1222}, 0x28) 03:55:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xb4}, 0x28) [ 1921.863368] FAULT_INJECTION: forcing a failure. [ 1921.863368] name failslab, interval 1, probability 0, space 0, times 0 [ 1921.899817] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1921.941218] CPU: 0 PID: 12711 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1921.948212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1921.957578] Call Trace: [ 1921.960185] dump_stack+0x244/0x39d [ 1921.963830] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1921.969053] ? debug_smp_processor_id+0x1c/0x20 [ 1921.973734] ? perf_trace_lock+0x14d/0x7a0 [ 1921.977990] should_fail.cold.4+0xa/0x17 [ 1921.982072] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1921.987177] ? __lock_acquire+0x62f/0x4c20 [ 1921.991448] ? rcu_softirq_qs+0x20/0x20 [ 1921.995437] ? unwind_dump+0x190/0x190 [ 1921.999345] ? zap_class+0x640/0x640 [ 1922.003075] ? find_held_lock+0x36/0x1c0 [ 1922.007149] ? __lock_is_held+0xb5/0x140 [ 1922.011233] ? security_file_alloc+0x4c/0xa0 [ 1922.015650] ? perf_trace_sched_process_exec+0x860/0x860 [ 1922.021110] ? avc_has_perm+0x55f/0x7e0 [ 1922.025112] __should_failslab+0x124/0x180 [ 1922.029360] should_failslab+0x9/0x14 [ 1922.033169] kmem_cache_alloc_trace+0x2d7/0x750 [ 1922.037861] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1922.043433] ext4_readdir+0x2734/0x3c30 [ 1922.047429] ? zap_class+0x640/0x640 [ 1922.051174] ? zap_class+0x640/0x640 [ 1922.054898] ? fsnotify+0xaae/0x12f0 [ 1922.058630] ? __ext4_check_dir_entry+0x350/0x350 [ 1922.063493] ? lock_acquire+0x1ed/0x520 [ 1922.067502] ? iterate_dir+0xd8/0x5d0 [ 1922.071346] ? lock_release+0xa00/0xa00 [ 1922.075543] ? perf_trace_sched_process_exec+0x860/0x860 [ 1922.081012] ? fsnotify_first_mark+0x350/0x350 [ 1922.085615] ? down_read_killable+0x90/0x150 [ 1922.090032] ? iterate_dir+0xd8/0x5d0 [ 1922.093844] ? down_write+0x130/0x130 [ 1922.097670] ? security_file_permission+0x1ba/0x220 [ 1922.102693] iterate_dir+0x48c/0x5d0 [ 1922.106425] ovl_check_d_type_supported+0x272/0x480 [ 1922.111457] ? ovl_cleanup_whiteouts+0x2a0/0x2a0 [ 1922.116220] ? ovl_dir_fsync+0x4f0/0x4f0 [ 1922.120323] ovl_fill_super+0xe12/0x3f7b [ 1922.124424] ? ovl_show_options+0x550/0x550 [ 1922.128751] ? __free_pages+0x103/0x190 [ 1922.132735] ? selinux_sb_copy_data+0x602/0x740 [ 1922.137424] ? selinux_capable+0x36/0x40 [ 1922.141492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1922.147044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1922.152599] ? get_anon_bdev+0xc0/0xc0 [ 1922.156492] ? sget+0x113/0x150 [ 1922.159797] ? ovl_show_options+0x550/0x550 [ 1922.164128] mount_nodev+0x6b/0x110 [ 1922.167767] ovl_mount+0x2c/0x40 [ 1922.171145] mount_fs+0xae/0x31d [ 1922.174526] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1922.179122] ? may_umount+0xb0/0xb0 [ 1922.182754] ? _raw_read_unlock+0x2c/0x50 [ 1922.186918] ? __get_fs_type+0x97/0xc0 [ 1922.190833] do_mount+0x581/0x31f0 [ 1922.194406] ? check_preemption_disabled+0x48/0x280 [ 1922.199438] ? copy_mount_string+0x40/0x40 [ 1922.203699] ? copy_mount_options+0x5f/0x430 [ 1922.208137] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1922.213201] ? kmem_cache_alloc_trace+0x353/0x750 [ 1922.218086] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1922.223645] ? _copy_from_user+0xdf/0x150 [ 1922.227807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1922.233355] ? copy_mount_options+0x315/0x430 [ 1922.237873] ksys_mount+0x12d/0x140 [ 1922.241535] __x64_sys_mount+0xbe/0x150 [ 1922.245526] do_syscall_64+0x1b9/0x820 [ 1922.249421] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1922.254805] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1922.259737] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1922.264586] ? trace_hardirqs_on_caller+0x310/0x310 [ 1922.269614] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1922.274641] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1922.279684] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1922.284554] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1922.289758] RIP: 0033:0x457569 [ 1922.292958] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1922.311889] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1922.319604] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1922.326886] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1922.334159] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 03:55:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1011}, 0x28) [ 1922.341431] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1922.348722] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:55 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}]}, 0x80}}, 0x0) 03:55:55 executing program 5 (fault-call:2 fault-nth:43): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:55 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xa0008000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x142800]}}, 0x1c) close(r1) 03:55:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x705}, 0x28) 03:55:56 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x14d}, 0x28) [ 1922.563356] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1922.575304] FAULT_INJECTION: forcing a failure. [ 1922.575304] name failslab, interval 1, probability 0, space 0, times 0 [ 1922.617135] CPU: 1 PID: 12745 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1922.624124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1922.633498] Call Trace: [ 1922.636116] dump_stack+0x244/0x39d [ 1922.639766] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1922.644978] ? debug_smp_processor_id+0x1c/0x20 [ 1922.649662] ? perf_trace_lock+0x14d/0x7a0 [ 1922.653919] should_fail.cold.4+0xa/0x17 [ 1922.657996] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1922.663122] ? zap_class+0x640/0x640 [ 1922.666843] ? kasan_kmalloc+0xc7/0xe0 [ 1922.670745] ? kasan_slab_alloc+0x12/0x20 [ 1922.674895] ? kmem_cache_alloc+0x12e/0x730 [ 1922.679222] ? __alloc_file+0xa8/0x470 [ 1922.683117] ? alloc_empty_file+0x72/0x170 [ 1922.687367] ? find_held_lock+0x36/0x1c0 [ 1922.691452] ? __lock_is_held+0xb5/0x140 [ 1922.695562] ? perf_trace_sched_process_exec+0x860/0x860 [ 1922.701025] ? check_preemption_disabled+0x48/0x280 [ 1922.706063] __should_failslab+0x124/0x180 [ 1922.710316] should_failslab+0x9/0x14 [ 1922.714125] kmem_cache_alloc+0x2be/0x730 [ 1922.718290] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1922.723319] selinux_file_alloc_security+0xb4/0x190 [ 1922.728349] security_file_alloc+0x4c/0xa0 [ 1922.732610] __alloc_file+0x12a/0x470 [ 1922.736420] ? file_free_rcu+0xd0/0xd0 [ 1922.740315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1922.745875] ? notify_change+0x792/0x1110 [ 1922.750042] ? up_write+0x7b/0x220 [ 1922.753591] ? down_write_nested+0x130/0x130 [ 1922.758015] alloc_empty_file+0x72/0x170 [ 1922.762107] dentry_open+0x71/0x1d0 [ 1922.765743] ovl_path_open+0x58/0x70 [ 1922.769468] ovl_check_d_type_supported+0x109/0x480 [ 1922.774495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1922.780047] ? ovl_cleanup_whiteouts+0x2a0/0x2a0 [ 1922.784810] ? ovl_dir_fsync+0x4f0/0x4f0 [ 1922.788913] ovl_fill_super+0xe12/0x3f7b [ 1922.793012] ? ovl_show_options+0x550/0x550 [ 1922.797344] ? __free_pages+0x103/0x190 [ 1922.801336] ? selinux_sb_copy_data+0x602/0x740 [ 1922.806038] ? selinux_capable+0x36/0x40 [ 1922.810114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1922.815675] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1922.821232] ? get_anon_bdev+0xc0/0xc0 [ 1922.825124] ? sget+0x113/0x150 [ 1922.828449] ? ovl_show_options+0x550/0x550 [ 1922.832778] mount_nodev+0x6b/0x110 [ 1922.836415] ovl_mount+0x2c/0x40 [ 1922.839789] mount_fs+0xae/0x31d [ 1922.843173] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1922.847776] ? may_umount+0xb0/0xb0 [ 1922.851418] ? _raw_read_unlock+0x2c/0x50 [ 1922.855818] ? __get_fs_type+0x97/0xc0 [ 1922.859733] do_mount+0x581/0x31f0 [ 1922.863708] ? retint_kernel+0x1b/0x2d [ 1922.867603] ? trace_hardirqs_on+0x310/0x310 [ 1922.872030] ? copy_mount_string+0x40/0x40 [ 1922.876276] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1922.881049] ? retint_kernel+0x2d/0x2d [ 1922.884957] ? copy_mount_options+0x1e3/0x430 [ 1922.889459] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1922.894313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1922.899872] ? copy_mount_options+0x315/0x430 [ 1922.904413] ksys_mount+0x12d/0x140 [ 1922.908061] __x64_sys_mount+0xbe/0x150 [ 1922.912053] do_syscall_64+0x1b9/0x820 [ 1922.915950] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1922.921330] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1922.926265] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1922.931117] ? trace_hardirqs_on_caller+0x310/0x310 [ 1922.936147] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1922.941173] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1922.946205] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1922.951069] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1922.956262] RIP: 0033:0x457569 [ 1922.959464] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1922.978545] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1922.986261] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1922.993531] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1923.000814] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1923.008092] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 03:55:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x707}, 0x28) [ 1923.015368] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:56 executing program 5 (fault-call:2 fault-nth:44): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:56 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}]}, 0x80}}, 0x0) 03:55:56 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xf00000000000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:56 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa61}, 0x28) 03:55:56 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1802]}}, 0x1c) close(r1) 03:55:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x242}, 0x28) [ 1923.196925] FAULT_INJECTION: forcing a failure. [ 1923.196925] name failslab, interval 1, probability 0, space 0, times 0 [ 1923.228462] CPU: 1 PID: 12765 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1923.235441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1923.244816] Call Trace: [ 1923.247430] dump_stack+0x244/0x39d [ 1923.251076] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1923.256277] ? debug_smp_processor_id+0x1c/0x20 [ 1923.260962] ? perf_trace_lock+0x14d/0x7a0 [ 1923.265236] should_fail.cold.4+0xa/0x17 [ 1923.269314] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1923.274441] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1923.279487] ? ext4_data_block_valid+0x28b/0x330 [ 1923.284295] ? __check_block_validity.constprop.79+0xd9/0x210 [ 1923.290198] ? zap_class+0x640/0x640 [ 1923.293920] ? ext4_map_blocks+0x429/0x1b40 [ 1923.298261] ? find_held_lock+0x36/0x1c0 [ 1923.302336] ? __lock_is_held+0xb5/0x140 [ 1923.306453] ? perf_trace_sched_process_exec+0x860/0x860 [ 1923.311928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1923.317477] ? ext4fs_dirhash+0xb49/0x10d0 [ 1923.321740] __should_failslab+0x124/0x180 [ 1923.325989] should_failslab+0x9/0x14 [ 1923.329798] __kmalloc+0x2d4/0x760 [ 1923.333372] ? rcu_softirq_qs+0x20/0x20 [ 1923.337362] ? rcu_softirq_qs+0x20/0x20 [ 1923.341348] ? unwind_dump+0x190/0x190 [ 1923.345257] ? ext4_htree_store_dirent+0x8d/0x5a0 [ 1923.350151] ext4_htree_store_dirent+0x8d/0x5a0 [ 1923.354872] htree_dirblock_to_tree+0x56b/0xae0 [ 1923.359564] ? dx_probe+0x1120/0x1120 [ 1923.363392] ? save_stack+0xa9/0xd0 [ 1923.367028] ? save_stack+0x43/0xd0 [ 1923.370665] ? ext4_readdir+0x2734/0x3c30 [ 1923.374866] ? iterate_dir+0x48c/0x5d0 [ 1923.378789] ? ovl_check_d_type_supported+0x272/0x480 [ 1923.383987] ? ovl_fill_super+0xe12/0x3f7b [ 1923.388225] ? mount_nodev+0x6b/0x110 [ 1923.392050] ? ovl_mount+0x2c/0x40 [ 1923.395592] ? mount_fs+0xae/0x31d [ 1923.399139] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 1923.403915] ? do_mount+0x581/0x31f0 [ 1923.407656] ? ksys_mount+0x12d/0x140 [ 1923.411461] ? __x64_sys_mount+0xbe/0x150 [ 1923.415657] ? do_syscall_64+0x1b9/0x820 [ 1923.419747] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1923.425124] ext4_htree_fill_tree+0x40c/0xd60 [ 1923.429635] ? do_split+0x1bc0/0x1bc0 [ 1923.433446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1923.438990] ? check_preemption_disabled+0x48/0x280 [ 1923.444026] ? __lock_is_held+0xb5/0x140 [ 1923.448109] ? ext4_readdir+0x2734/0x3c30 [ 1923.452281] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1923.457301] ? kmem_cache_alloc_trace+0x353/0x750 [ 1923.462176] ext4_readdir+0x1ca1/0x3c30 [ 1923.466205] ? __ext4_check_dir_entry+0x350/0x350 [ 1923.471092] ? lock_acquire+0x1ed/0x520 [ 1923.475112] ? iterate_dir+0xd8/0x5d0 [ 1923.478951] ? lock_release+0xa00/0xa00 [ 1923.482977] ? perf_trace_sched_process_exec+0x860/0x860 [ 1923.488440] ? fsnotify_first_mark+0x350/0x350 [ 1923.493062] ? down_read_killable+0x90/0x150 [ 1923.497475] ? iterate_dir+0xd8/0x5d0 [ 1923.501310] ? down_write+0x130/0x130 [ 1923.505235] ? security_file_permission+0x1ba/0x220 [ 1923.510272] iterate_dir+0x48c/0x5d0 [ 1923.514005] ovl_check_d_type_supported+0x272/0x480 [ 1923.519036] ? ovl_cleanup_whiteouts+0x2a0/0x2a0 [ 1923.523865] ? ovl_dir_fsync+0x4f0/0x4f0 [ 1923.527961] ovl_fill_super+0xe12/0x3f7b [ 1923.532074] ? ovl_show_options+0x550/0x550 [ 1923.536439] ? __free_pages+0x103/0x190 [ 1923.540469] ? selinux_sb_copy_data+0x602/0x740 [ 1923.545186] ? selinux_capable+0x36/0x40 [ 1923.549255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1923.554834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1923.560411] ? get_anon_bdev+0xc0/0xc0 [ 1923.564309] ? sget+0x113/0x150 [ 1923.567603] ? ovl_show_options+0x550/0x550 [ 1923.571955] mount_nodev+0x6b/0x110 [ 1923.575617] ovl_mount+0x2c/0x40 [ 1923.579017] mount_fs+0xae/0x31d [ 1923.582403] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1923.586998] ? may_umount+0xb0/0xb0 [ 1923.590631] ? _raw_read_unlock+0x2c/0x50 [ 1923.594785] ? __get_fs_type+0x97/0xc0 [ 1923.598707] do_mount+0x581/0x31f0 [ 1923.602260] ? retint_kernel+0x1b/0x2d [ 1923.606168] ? trace_hardirqs_on+0x310/0x310 [ 1923.610611] ? copy_mount_string+0x40/0x40 [ 1923.614913] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1923.619716] ? retint_kernel+0x2d/0x2d [ 1923.623644] ? copy_mount_options+0x1e3/0x430 [ 1923.628172] ? __sanitizer_cov_trace_pc+0x44/0x50 [ 1923.633036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1923.638582] ? copy_mount_options+0x315/0x430 [ 1923.643090] ksys_mount+0x12d/0x140 [ 1923.646743] __x64_sys_mount+0xbe/0x150 [ 1923.650754] do_syscall_64+0x1b9/0x820 [ 1923.654652] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1923.660024] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1923.664960] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1923.669811] ? trace_hardirqs_on_caller+0x310/0x310 [ 1923.674834] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1923.679878] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1923.684911] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1923.689774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1923.694975] RIP: 0033:0x457569 [ 1923.698173] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1923.717109] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1923.724826] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1923.732113] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1923.739394] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1923.746666] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1923.753937] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:57 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xe39}, 0x28) 03:55:57 executing program 5 (fault-call:2 fault-nth:45): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:57 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xefffffff]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:57 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}}]}, 0x80}}, 0x0) 03:55:57 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x82f}, 0x28) 03:55:57 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x7d0}, 0x28) [ 1923.949293] FAULT_INJECTION: forcing a failure. [ 1923.949293] name failslab, interval 1, probability 0, space 0, times 0 03:55:57 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1329}, 0x28) [ 1923.994340] CPU: 0 PID: 12788 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1924.001302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1924.010717] Call Trace: [ 1924.013332] dump_stack+0x244/0x39d [ 1924.016987] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1924.022193] ? debug_smp_processor_id+0x1c/0x20 [ 1924.026883] ? perf_trace_lock+0x14d/0x7a0 [ 1924.031140] should_fail.cold.4+0xa/0x17 [ 1924.035215] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1924.040336] ? save_stack+0x43/0xd0 [ 1924.043970] ? kasan_kmalloc+0xc7/0xe0 [ 1924.047870] ? __kmalloc+0x14e/0x760 [ 1924.051599] ? ext4_htree_store_dirent+0x8d/0x5a0 [ 1924.056444] ? htree_dirblock_to_tree+0x56b/0xae0 [ 1924.061290] ? zap_class+0x640/0x640 [ 1924.065011] ? ovl_check_d_type_supported+0x272/0x480 [ 1924.070230] ? mount_nodev+0x6b/0x110 [ 1924.074055] ? ovl_mount+0x2c/0x40 [ 1924.077725] ? mount_fs+0xae/0x31d [ 1924.081283] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 1924.086045] ? do_mount+0x581/0x31f0 [ 1924.089769] ? find_held_lock+0x36/0x1c0 [ 1924.093840] ? __lock_is_held+0xb5/0x140 [ 1924.097947] ? perf_trace_sched_process_exec+0x860/0x860 [ 1924.103430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1924.108980] ? ext4fs_dirhash+0xb49/0x10d0 [ 1924.113237] __should_failslab+0x124/0x180 [ 1924.117482] should_failslab+0x9/0x14 [ 1924.121316] __kmalloc+0x2d4/0x760 [ 1924.124884] ? rcu_softirq_qs+0x20/0x20 [ 1924.128881] ? rcu_softirq_qs+0x20/0x20 [ 1924.132867] ? unwind_dump+0x190/0x190 [ 1924.136768] ? ext4_htree_store_dirent+0x8d/0x5a0 [ 1924.141626] ext4_htree_store_dirent+0x8d/0x5a0 [ 1924.146308] htree_dirblock_to_tree+0x56b/0xae0 [ 1924.151000] ? dx_probe+0x1120/0x1120 [ 1924.154811] ? save_stack+0xa9/0xd0 [ 1924.158443] ? save_stack+0x43/0xd0 [ 1924.162079] ? ext4_readdir+0x2734/0x3c30 [ 1924.166229] ? iterate_dir+0x48c/0x5d0 [ 1924.170128] ? ovl_check_d_type_supported+0x272/0x480 [ 1924.175324] ? ovl_fill_super+0xe12/0x3f7b [ 1924.179563] ? mount_nodev+0x6b/0x110 [ 1924.183369] ? ovl_mount+0x2c/0x40 [ 1924.186913] ? mount_fs+0xae/0x31d [ 1924.190457] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 1924.195215] ? do_mount+0x581/0x31f0 [ 1924.198950] ? ksys_mount+0x12d/0x140 [ 1924.202755] ? __x64_sys_mount+0xbe/0x150 [ 1924.206917] ? do_syscall_64+0x1b9/0x820 [ 1924.210991] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1924.216371] ext4_htree_fill_tree+0x40c/0xd60 [ 1924.220892] ? do_split+0x1bc0/0x1bc0 [ 1924.224724] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1924.230269] ? check_preemption_disabled+0x48/0x280 [ 1924.235302] ? __lock_is_held+0xb5/0x140 [ 1924.239384] ? ext4_readdir+0x2734/0x3c30 [ 1924.243537] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1924.248560] ? kmem_cache_alloc_trace+0x353/0x750 [ 1924.253425] ext4_readdir+0x1ca1/0x3c30 [ 1924.257438] ? __ext4_check_dir_entry+0x350/0x350 [ 1924.262304] ? lock_acquire+0x1ed/0x520 [ 1924.266281] ? iterate_dir+0xd8/0x5d0 [ 1924.270095] ? lock_release+0xa00/0xa00 [ 1924.274077] ? perf_trace_sched_process_exec+0x860/0x860 [ 1924.279555] ? fsnotify_first_mark+0x350/0x350 [ 1924.284160] ? down_read_killable+0x90/0x150 [ 1924.288588] ? iterate_dir+0xd8/0x5d0 [ 1924.292395] ? down_write+0x130/0x130 [ 1924.296205] ? security_file_permission+0x1ba/0x220 [ 1924.301234] iterate_dir+0x48c/0x5d0 [ 1924.304972] ovl_check_d_type_supported+0x272/0x480 [ 1924.310002] ? ovl_cleanup_whiteouts+0x2a0/0x2a0 [ 1924.314765] ? ovl_dir_fsync+0x4f0/0x4f0 [ 1924.318869] ovl_fill_super+0xe12/0x3f7b [ 1924.322974] ? ovl_show_options+0x550/0x550 [ 1924.327308] ? __free_pages+0x103/0x190 [ 1924.331290] ? selinux_sb_copy_data+0x602/0x740 [ 1924.335980] ? selinux_capable+0x36/0x40 [ 1924.340048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1924.345597] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1924.351157] ? get_anon_bdev+0xc0/0xc0 [ 1924.355070] ? sget+0x113/0x150 [ 1924.358367] ? ovl_show_options+0x550/0x550 [ 1924.362700] mount_nodev+0x6b/0x110 [ 1924.366341] ovl_mount+0x2c/0x40 [ 1924.369720] mount_fs+0xae/0x31d [ 1924.373105] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1924.378065] ? may_umount+0xb0/0xb0 [ 1924.381701] ? _raw_read_unlock+0x2c/0x50 [ 1924.385862] ? __get_fs_type+0x97/0xc0 [ 1924.389790] do_mount+0x581/0x31f0 [ 1924.393336] ? check_preemption_disabled+0x48/0x280 [ 1924.398379] ? copy_mount_string+0x40/0x40 [ 1924.402652] ? copy_mount_options+0x5f/0x430 [ 1924.407069] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1924.412093] ? kmem_cache_alloc_trace+0x353/0x750 [ 1924.416946] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1924.422489] ? _copy_from_user+0xdf/0x150 [ 1924.426649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1924.432193] ? copy_mount_options+0x315/0x430 [ 1924.436705] ksys_mount+0x12d/0x140 [ 1924.440347] __x64_sys_mount+0xbe/0x150 [ 1924.444339] do_syscall_64+0x1b9/0x820 [ 1924.448240] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1924.453610] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1924.458545] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1924.463400] ? trace_hardirqs_on_caller+0x310/0x310 [ 1924.468427] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1924.473451] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1924.478482] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1924.483343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1924.488535] RIP: 0033:0x457569 [ 1924.491734] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1924.510640] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1924.518377] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1924.525649] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1924.532938] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 03:55:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}}, 0x1c) close(r1) [ 1924.540210] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1924.547479] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:58 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}]}, 0x80}}, 0x0) 03:55:58 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x5000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:58 executing program 5 (fault-call:2 fault-nth:46): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:58 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x992}, 0x28) 03:55:58 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x5a4}, 0x28) [ 1924.721399] FAULT_INJECTION: forcing a failure. [ 1924.721399] name failslab, interval 1, probability 0, space 0, times 0 [ 1924.755316] CPU: 0 PID: 12807 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1924.762286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:55:58 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x5]}}]}, 0x80}}, 0x0) [ 1924.771681] Call Trace: [ 1924.774298] dump_stack+0x244/0x39d [ 1924.777961] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1924.783179] ? debug_smp_processor_id+0x1c/0x20 [ 1924.787871] ? perf_trace_lock+0x14d/0x7a0 [ 1924.792144] should_fail.cold.4+0xa/0x17 [ 1924.796237] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1924.801361] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1924.806397] ? ext4_data_block_valid+0x28b/0x330 [ 1924.811182] ? __check_block_validity.constprop.79+0xd9/0x210 [ 1924.817096] ? zap_class+0x640/0x640 [ 1924.820829] ? ext4_map_blocks+0x429/0x1b40 [ 1924.825200] ? find_held_lock+0x36/0x1c0 [ 1924.829286] ? __lock_is_held+0xb5/0x140 [ 1924.833382] ? perf_trace_sched_process_exec+0x860/0x860 [ 1924.838844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1924.844421] ? ext4fs_dirhash+0xb49/0x10d0 [ 1924.848706] __should_failslab+0x124/0x180 [ 1924.852970] should_failslab+0x9/0x14 [ 1924.856775] __kmalloc+0x2d4/0x760 [ 1924.860330] ? rcu_softirq_qs+0x20/0x20 [ 1924.864320] ? rcu_softirq_qs+0x20/0x20 [ 1924.868296] ? unwind_dump+0x190/0x190 [ 1924.872199] ? ext4_htree_store_dirent+0x8d/0x5a0 [ 1924.877060] ext4_htree_store_dirent+0x8d/0x5a0 [ 1924.881745] htree_dirblock_to_tree+0x56b/0xae0 [ 1924.886441] ? dx_probe+0x1120/0x1120 [ 1924.890249] ? save_stack+0xa9/0xd0 [ 1924.893908] ? save_stack+0x43/0xd0 [ 1924.897543] ? ext4_readdir+0x2734/0x3c30 [ 1924.901714] ? iterate_dir+0x48c/0x5d0 [ 1924.905606] ? ovl_check_d_type_supported+0x272/0x480 [ 1924.910802] ? ovl_fill_super+0xe12/0x3f7b [ 1924.915046] ? mount_nodev+0x6b/0x110 [ 1924.918862] ? ovl_mount+0x2c/0x40 [ 1924.922413] ? mount_fs+0xae/0x31d [ 1924.925980] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 1924.930740] ? do_mount+0x581/0x31f0 [ 1924.934501] ? ksys_mount+0x12d/0x140 [ 1924.938335] ? __x64_sys_mount+0xbe/0x150 [ 1924.942498] ? do_syscall_64+0x1b9/0x820 [ 1924.946583] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1924.951966] ext4_htree_fill_tree+0x40c/0xd60 [ 1924.956480] ? do_split+0x1bc0/0x1bc0 [ 1924.960289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1924.965834] ? check_preemption_disabled+0x48/0x280 [ 1924.971336] ? __lock_is_held+0xb5/0x140 [ 1924.975418] ? ext4_readdir+0x2734/0x3c30 [ 1924.979837] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1924.984895] ? kmem_cache_alloc_trace+0x353/0x750 [ 1924.989780] ext4_readdir+0x1ca1/0x3c30 [ 1924.993795] ? __ext4_check_dir_entry+0x350/0x350 [ 1924.998672] ? lock_acquire+0x1ed/0x520 [ 1925.002651] ? iterate_dir+0xd8/0x5d0 [ 1925.006472] ? lock_release+0xa00/0xa00 [ 1925.010461] ? perf_trace_sched_process_exec+0x860/0x860 [ 1925.015938] ? fsnotify_first_mark+0x350/0x350 [ 1925.020555] ? down_read_killable+0x90/0x150 [ 1925.024965] ? iterate_dir+0xd8/0x5d0 [ 1925.028770] ? down_write+0x130/0x130 [ 1925.032583] ? security_file_permission+0x1ba/0x220 [ 1925.037614] iterate_dir+0x48c/0x5d0 [ 1925.041351] ovl_check_d_type_supported+0x272/0x480 [ 1925.046381] ? ovl_cleanup_whiteouts+0x2a0/0x2a0 [ 1925.051142] ? ovl_dir_fsync+0x4f0/0x4f0 [ 1925.055235] ovl_fill_super+0xe12/0x3f7b [ 1925.059341] ? ovl_show_options+0x550/0x550 [ 1925.063665] ? __free_pages+0x103/0x190 [ 1925.067689] ? selinux_sb_copy_data+0x602/0x740 [ 1925.072380] ? selinux_capable+0x36/0x40 [ 1925.076455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1925.082039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1925.087590] ? get_anon_bdev+0xc0/0xc0 [ 1925.091509] ? sget+0x113/0x150 [ 1925.094822] ? ovl_show_options+0x550/0x550 [ 1925.099167] mount_nodev+0x6b/0x110 [ 1925.102811] ovl_mount+0x2c/0x40 [ 1925.106211] mount_fs+0xae/0x31d [ 1925.109612] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1925.114215] ? may_umount+0xb0/0xb0 [ 1925.117860] ? _raw_read_unlock+0x2c/0x50 [ 1925.122021] ? __get_fs_type+0x97/0xc0 [ 1925.125926] do_mount+0x581/0x31f0 [ 1925.129472] ? check_preemption_disabled+0x48/0x280 [ 1925.134507] ? copy_mount_string+0x40/0x40 [ 1925.138774] ? copy_mount_options+0x5f/0x430 [ 1925.143188] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1925.148209] ? kmem_cache_alloc_trace+0x353/0x750 [ 1925.153067] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1925.158617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1925.164158] ? copy_mount_options+0x315/0x430 [ 1925.168667] ksys_mount+0x12d/0x140 [ 1925.172309] __x64_sys_mount+0xbe/0x150 [ 1925.176297] do_syscall_64+0x1b9/0x820 [ 1925.180191] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1925.185567] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1925.190503] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1925.195373] ? trace_hardirqs_on_caller+0x310/0x310 [ 1925.200397] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1925.205424] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1925.210467] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1925.215336] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1925.220530] RIP: 0033:0x457569 [ 1925.223732] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1925.242639] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1925.250359] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1925.257631] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1925.264906] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 03:55:58 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xccd}, 0x28) [ 1925.272183] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1925.279455] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:58 executing program 5 (fault-call:2 fault-nth:47): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:58 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}]}, 0x80}}, 0x0) 03:55:58 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x12f5}, 0x28) 03:55:58 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xf00]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1925.466353] FAULT_INJECTION: forcing a failure. [ 1925.466353] name failslab, interval 1, probability 0, space 0, times 0 [ 1925.480672] CPU: 0 PID: 12836 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1925.487627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1925.497255] Call Trace: [ 1925.499892] dump_stack+0x244/0x39d [ 1925.503535] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1925.508719] ? debug_smp_processor_id+0x1c/0x20 [ 1925.513380] ? perf_trace_lock+0x14d/0x7a0 [ 1925.517629] should_fail.cold.4+0xa/0x17 [ 1925.521687] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1925.526802] ? save_stack+0x43/0xd0 [ 1925.530431] ? kasan_kmalloc+0xc7/0xe0 [ 1925.534303] ? __kmalloc+0x14e/0x760 [ 1925.538023] ? ext4_htree_store_dirent+0x8d/0x5a0 [ 1925.542885] ? htree_dirblock_to_tree+0x56b/0xae0 [ 1925.547731] ? zap_class+0x640/0x640 [ 1925.551461] ? ovl_check_d_type_supported+0x272/0x480 [ 1925.556644] ? mount_nodev+0x6b/0x110 [ 1925.560437] ? ovl_mount+0x2c/0x40 [ 1925.563965] ? mount_fs+0xae/0x31d [ 1925.567492] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 1925.572241] ? do_mount+0x581/0x31f0 [ 1925.575971] ? find_held_lock+0x36/0x1c0 [ 1925.580056] ? __lock_is_held+0xb5/0x140 [ 1925.584164] ? __cast6_dec_blk8+0x22c0/0x66d8 [ 1925.588669] ? perf_trace_sched_process_exec+0x860/0x860 [ 1925.594107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1925.599642] ? ext4fs_dirhash+0xb49/0x10d0 [ 1925.603927] __should_failslab+0x124/0x180 [ 1925.608161] should_failslab+0x9/0x14 [ 1925.611952] __kmalloc+0x2d4/0x760 [ 1925.615482] ? rcu_softirq_qs+0x20/0x20 [ 1925.619446] ? rcu_softirq_qs+0x20/0x20 [ 1925.623420] ? unwind_dump+0x190/0x190 [ 1925.627298] ? ext4_htree_store_dirent+0x8d/0x5a0 [ 1925.632141] ext4_htree_store_dirent+0x8d/0x5a0 [ 1925.636808] htree_dirblock_to_tree+0x56b/0xae0 [ 1925.641477] ? dx_probe+0x1120/0x1120 [ 1925.645284] ? save_stack+0xa9/0xd0 [ 1925.648941] ? save_stack+0x43/0xd0 [ 1925.652559] ? ext4_readdir+0x2734/0x3c30 [ 1925.656709] ? iterate_dir+0x48c/0x5d0 [ 1925.660597] ? ovl_check_d_type_supported+0x272/0x480 [ 1925.665789] ? ovl_fill_super+0xe12/0x3f7b [ 1925.670017] ? mount_nodev+0x6b/0x110 [ 1925.673807] ? ovl_mount+0x2c/0x40 [ 1925.677333] ? mount_fs+0xae/0x31d [ 1925.680922] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 1925.685668] ? do_mount+0x581/0x31f0 [ 1925.689370] ? ksys_mount+0x12d/0x140 [ 1925.693164] ? __x64_sys_mount+0xbe/0x150 [ 1925.697302] ? do_syscall_64+0x1b9/0x820 [ 1925.701353] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1925.706736] ext4_htree_fill_tree+0x40c/0xd60 [ 1925.711237] ? do_split+0x1bc0/0x1bc0 [ 1925.715034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1925.720567] ? check_preemption_disabled+0x48/0x280 [ 1925.725592] ? __lock_is_held+0xb5/0x140 [ 1925.729670] ? ext4_readdir+0x2734/0x3c30 [ 1925.733818] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1925.738837] ? kmem_cache_alloc_trace+0x353/0x750 [ 1925.743696] ext4_readdir+0x1ca1/0x3c30 [ 1925.747677] ? __ext4_check_dir_entry+0x350/0x350 [ 1925.752525] ? lock_acquire+0x1ed/0x520 [ 1925.756492] ? iterate_dir+0xd8/0x5d0 [ 1925.760301] ? lock_release+0xa00/0xa00 [ 1925.764268] ? perf_trace_sched_process_exec+0x860/0x860 [ 1925.769715] ? fsnotify_first_mark+0x350/0x350 [ 1925.774298] ? down_read_killable+0x90/0x150 [ 1925.778977] ? iterate_dir+0xd8/0x5d0 [ 1925.782768] ? down_write+0x130/0x130 [ 1925.786566] ? security_file_permission+0x1ba/0x220 [ 1925.791576] iterate_dir+0x48c/0x5d0 [ 1925.795290] ovl_check_d_type_supported+0x272/0x480 [ 1925.800302] ? ovl_cleanup_whiteouts+0x2a0/0x2a0 [ 1925.805050] ? ovl_dir_fsync+0x4f0/0x4f0 [ 1925.809129] ovl_fill_super+0xe12/0x3f7b [ 1925.813197] ? ovl_show_options+0x550/0x550 [ 1925.817508] ? __free_pages+0x103/0x190 [ 1925.821474] ? selinux_sb_copy_data+0x602/0x740 [ 1925.826175] ? selinux_capable+0x36/0x40 [ 1925.830233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1925.835764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1925.841298] ? get_anon_bdev+0xc0/0xc0 [ 1925.845179] ? sget+0x113/0x150 [ 1925.848451] ? ovl_show_options+0x550/0x550 [ 1925.852782] mount_nodev+0x6b/0x110 [ 1925.856425] ovl_mount+0x2c/0x40 [ 1925.859785] mount_fs+0xae/0x31d [ 1925.863145] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1925.867720] ? may_umount+0xb0/0xb0 [ 1925.871346] ? _raw_read_unlock+0x2c/0x50 [ 1925.875479] ? __get_fs_type+0x97/0xc0 [ 1925.879361] do_mount+0x581/0x31f0 [ 1925.882907] ? check_preemption_disabled+0x48/0x280 [ 1925.887938] ? copy_mount_string+0x40/0x40 [ 1925.892179] ? copy_mount_options+0x5f/0x430 [ 1925.896578] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1925.901588] ? kmem_cache_alloc_trace+0x353/0x750 [ 1925.906428] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1925.911973] ? _copy_from_user+0xdf/0x150 [ 1925.916122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1925.921658] ? copy_mount_options+0x315/0x430 [ 1925.926153] ksys_mount+0x12d/0x140 [ 1925.929786] __x64_sys_mount+0xbe/0x150 [ 1925.933773] do_syscall_64+0x1b9/0x820 [ 1925.937668] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1925.943041] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1925.947965] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1925.952800] ? trace_hardirqs_on_caller+0x310/0x310 [ 1925.957817] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1925.962826] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1925.967870] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1925.972734] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1925.977926] RIP: 0033:0x457569 [ 1925.981117] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1926.000024] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1926.007721] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1926.014993] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1926.022254] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1926.029512] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1926.036768] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:55:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, 0x1c) close(r1) 03:55:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x405}, 0x28) 03:55:59 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x5c7}, 0x28) 03:55:59 executing program 5 (fault-call:2 fault-nth:48): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:55:59 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x2000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:55:59 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0xff3f]}}]}, 0x80}}, 0x0) [ 1926.202690] FAULT_INJECTION: forcing a failure. [ 1926.202690] name failslab, interval 1, probability 0, space 0, times 0 [ 1926.220802] CPU: 1 PID: 12849 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1926.227769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1926.237125] Call Trace: [ 1926.239724] dump_stack+0x244/0x39d [ 1926.243365] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1926.248587] should_fail.cold.4+0xa/0x17 [ 1926.252661] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1926.257794] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1926.262415] ? trace_hardirqs_on+0xbd/0x310 [ 1926.266755] ? kasan_check_read+0x11/0x20 [ 1926.270927] ? __debug_object_init+0x57d/0x1290 [ 1926.275632] ? trace_hardirqs_off_caller+0x310/0x310 [ 1926.280754] ? do_raw_spin_trylock+0x270/0x270 [ 1926.285348] ? zap_class+0x640/0x640 [ 1926.289086] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1926.294199] ? __debug_object_init+0x57d/0x1290 [ 1926.298911] ? vfs_tmpfile+0x13b/0x2a0 [ 1926.302807] ? ovl_fill_super+0xe70/0x3f7b [ 1926.307044] ? mount_nodev+0x6b/0x110 [ 1926.310861] ? ovl_mount+0x2c/0x40 [ 1926.314415] ? __lock_is_held+0xb5/0x140 [ 1926.318499] ? debug_object_free+0x690/0x690 [ 1926.322932] ? perf_trace_sched_process_exec+0x860/0x860 [ 1926.328406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1926.333950] ? check_preemption_disabled+0x48/0x280 [ 1926.338988] __should_failslab+0x124/0x180 [ 1926.343230] should_failslab+0x9/0x14 [ 1926.347038] kmem_cache_alloc+0x2be/0x730 [ 1926.351208] selinux_inode_alloc_security+0x107/0x3a0 [ 1926.356412] ? inode_free_rcu+0x20/0x20 [ 1926.360396] ? __put_user_ns+0x60/0x60 [ 1926.364293] ? lockdep_init_map+0x9/0x10 [ 1926.368360] ? ext4_alloc_inode+0x6e3/0x870 [ 1926.372705] security_inode_alloc+0x73/0xd0 [ 1926.377050] inode_init_always+0x68f/0xd80 [ 1926.381299] ? __address_space_init_once+0x240/0x240 [ 1926.386439] ? __lock_acquire+0x62f/0x4c20 [ 1926.390695] ? zap_class+0x640/0x640 [ 1926.394435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1926.400005] alloc_inode+0x80/0x190 [ 1926.403642] new_inode_pseudo+0x71/0x1a0 [ 1926.407716] ? prune_icache_sb+0x1c0/0x1c0 [ 1926.411977] new_inode+0x1c/0x40 [ 1926.415372] __ext4_new_inode+0x4cd/0x65b0 [ 1926.419622] ? print_usage_bug+0xc0/0xc0 [ 1926.423699] ? is_bpf_text_address+0xd3/0x170 [ 1926.428206] ? __kernel_text_address+0xd/0x40 [ 1926.432724] ? unwind_get_return_address+0x61/0xa0 [ 1926.437668] ? ext4_free_inode+0x1a10/0x1a10 [ 1926.442093] ? __lock_acquire+0x62f/0x4c20 [ 1926.446338] ? save_stack+0xa9/0xd0 [ 1926.449971] ? save_stack+0x43/0xd0 [ 1926.453614] ? kasan_kmalloc+0xc7/0xe0 [ 1926.457509] ? kasan_slab_alloc+0x12/0x20 [ 1926.461678] ? kmem_cache_alloc+0x12e/0x730 [ 1926.466028] ? mark_held_locks+0x130/0x130 [ 1926.470270] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1926.475660] ? find_held_lock+0x36/0x1c0 [ 1926.479734] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1926.485278] ? check_preemption_disabled+0x48/0x280 [ 1926.490317] ? debug_smp_processor_id+0x1c/0x20 [ 1926.494987] ? perf_trace_lock+0x14d/0x7a0 [ 1926.499235] ? lock_is_held_type+0x210/0x210 [ 1926.503681] ? __lock_is_held+0xb5/0x140 [ 1926.507756] ? zap_class+0x640/0x640 [ 1926.511485] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1926.516510] ? __lockdep_init_map+0x105/0x590 [ 1926.521015] ? d_set_d_op+0x31d/0x410 [ 1926.524843] ? find_held_lock+0x36/0x1c0 [ 1926.528927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1926.534474] ? __dquot_initialize+0x629/0xdd0 [ 1926.538988] ? lock_downgrade+0x900/0x900 [ 1926.543144] ? dquot_get_next_dqblk+0x180/0x180 [ 1926.547830] ? kasan_check_read+0x11/0x20 [ 1926.551993] ? do_raw_spin_unlock+0xa7/0x330 [ 1926.556415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1926.561980] ext4_tmpfile+0x187/0x4e0 [ 1926.565800] ? ext4_orphan_add+0xdb0/0xdb0 [ 1926.570039] ? security_inode_permission+0xd2/0x100 [ 1926.575069] ? inode_permission+0xb2/0x560 [ 1926.579318] vfs_tmpfile+0x13b/0x2a0 [ 1926.583062] ovl_fill_super+0xe70/0x3f7b [ 1926.587156] ? ovl_show_options+0x550/0x550 [ 1926.591484] ? __free_pages+0x103/0x190 [ 1926.595491] ? selinux_sb_copy_data+0x602/0x740 [ 1926.600181] ? selinux_capable+0x36/0x40 [ 1926.604251] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1926.609799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1926.615348] ? get_anon_bdev+0xc0/0xc0 [ 1926.619247] ? sget+0x113/0x150 [ 1926.622536] ? ovl_show_options+0x550/0x550 [ 1926.626874] mount_nodev+0x6b/0x110 [ 1926.630518] ovl_mount+0x2c/0x40 [ 1926.633899] mount_fs+0xae/0x31d [ 1926.637293] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1926.642060] ? may_umount+0xb0/0xb0 [ 1926.645706] ? _raw_read_unlock+0x2c/0x50 [ 1926.649888] ? __get_fs_type+0x97/0xc0 [ 1926.653805] do_mount+0x581/0x31f0 [ 1926.657367] ? check_preemption_disabled+0x48/0x280 [ 1926.662411] ? copy_mount_string+0x40/0x40 [ 1926.666667] ? copy_mount_options+0x5f/0x430 [ 1926.671082] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1926.676129] ? kmem_cache_alloc_trace+0x353/0x750 [ 1926.680992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1926.686535] ? copy_mount_options+0x315/0x430 [ 1926.691042] ksys_mount+0x12d/0x140 [ 1926.694693] __x64_sys_mount+0xbe/0x150 [ 1926.698690] do_syscall_64+0x1b9/0x820 [ 1926.702588] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1926.707972] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1926.712911] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1926.717780] ? trace_hardirqs_on_caller+0x310/0x310 [ 1926.722818] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1926.727863] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1926.732903] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1926.737764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1926.742959] RIP: 0033:0x457569 [ 1926.746162] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1926.765068] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1926.772782] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1926.780052] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1926.787329] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1926.794601] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 03:56:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x398}, 0x28) 03:56:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xc54}, 0x28) [ 1926.801903] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 [ 1926.819245] overlayfs: upper fs does not support tmpfile. 03:56:00 executing program 5 (fault-call:2 fault-nth:49): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:56:00 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x2]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:56:00 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x3fff]}}]}, 0x80}}, 0x0) 03:56:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x9f8}, 0x28) [ 1927.037802] FAULT_INJECTION: forcing a failure. [ 1927.037802] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1927.050667] CPU: 0 PID: 12875 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1927.057603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1927.066971] Call Trace: [ 1927.069583] dump_stack+0x244/0x39d [ 1927.073231] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1927.078455] should_fail.cold.4+0xa/0x17 [ 1927.082550] ? check_preemption_disabled+0x48/0x280 [ 1927.087579] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1927.092688] ? zap_class+0x640/0x640 [ 1927.096409] ? __lock_is_held+0xb5/0x140 [ 1927.100476] ? zap_class+0x640/0x640 [ 1927.104209] ? find_held_lock+0x36/0x1c0 [ 1927.108292] ? is_bpf_text_address+0xac/0x170 [ 1927.112800] ? lock_downgrade+0x900/0x900 [ 1927.116951] ? check_preemption_disabled+0x48/0x280 [ 1927.121985] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1927.126925] ? kasan_check_read+0x11/0x20 [ 1927.131084] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1927.136370] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1927.141922] ? should_fail+0x22d/0xd01 [ 1927.145821] ? rcu_softirq_qs+0x20/0x20 [ 1927.149825] ? unwind_dump+0x190/0x190 [ 1927.153733] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1927.158861] __alloc_pages_nodemask+0x34b/0xde0 [ 1927.163541] ? kernel_text_address+0x79/0xf0 [ 1927.167969] ? __alloc_pages_slowpath+0x2d70/0x2d70 [ 1927.173063] ? trace_hardirqs_off+0xb8/0x310 [ 1927.177485] cache_grow_begin+0xa5/0x8c0 [ 1927.181554] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1927.187102] ? check_preemption_disabled+0x48/0x280 [ 1927.192135] kmem_cache_alloc+0x66b/0x730 [ 1927.196300] ? ratelimit_state_init+0xb0/0xb0 [ 1927.200807] ext4_alloc_inode+0xc7/0x870 [ 1927.204887] ? ratelimit_state_init+0xb0/0xb0 [ 1927.209402] ? zap_class+0x640/0x640 [ 1927.213130] ? __lock_acquire+0x62f/0x4c20 [ 1927.217386] ? zap_class+0x640/0x640 [ 1927.221112] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1927.226661] ? ratelimit_state_init+0xb0/0xb0 [ 1927.231170] alloc_inode+0x63/0x190 [ 1927.234811] new_inode_pseudo+0x71/0x1a0 [ 1927.238907] ? prune_icache_sb+0x1c0/0x1c0 [ 1927.243165] new_inode+0x1c/0x40 [ 1927.246539] __ext4_new_inode+0x4cd/0x65b0 [ 1927.250799] ? print_usage_bug+0xc0/0xc0 [ 1927.254888] ? is_bpf_text_address+0xd3/0x170 [ 1927.259436] ? __kernel_text_address+0xd/0x40 [ 1927.263938] ? unwind_get_return_address+0x61/0xa0 [ 1927.268894] ? ext4_free_inode+0x1a10/0x1a10 [ 1927.273323] ? __lock_acquire+0x62f/0x4c20 [ 1927.277566] ? save_stack+0xa9/0xd0 [ 1927.281203] ? save_stack+0x43/0xd0 [ 1927.284833] ? kasan_kmalloc+0xc7/0xe0 [ 1927.288736] ? kasan_slab_alloc+0x12/0x20 [ 1927.292894] ? kmem_cache_alloc+0x12e/0x730 [ 1927.297233] ? mark_held_locks+0x130/0x130 [ 1927.301480] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1927.306864] ? find_held_lock+0x36/0x1c0 [ 1927.310951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1927.316498] ? check_preemption_disabled+0x48/0x280 [ 1927.321533] ? debug_smp_processor_id+0x1c/0x20 [ 1927.326214] ? perf_trace_lock+0x14d/0x7a0 [ 1927.330467] ? lock_is_held_type+0x210/0x210 [ 1927.334929] ? __lock_is_held+0xb5/0x140 [ 1927.339011] ? zap_class+0x640/0x640 [ 1927.342908] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1927.347936] ? __lockdep_init_map+0x105/0x590 [ 1927.352446] ? d_set_d_op+0x31d/0x410 [ 1927.356257] ? find_held_lock+0x36/0x1c0 [ 1927.360339] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1927.365907] ? __dquot_initialize+0x629/0xdd0 [ 1927.370414] ? lock_downgrade+0x900/0x900 [ 1927.374570] ? dquot_get_next_dqblk+0x180/0x180 [ 1927.379253] ? kasan_check_read+0x11/0x20 [ 1927.383408] ? do_raw_spin_unlock+0xa7/0x330 [ 1927.387841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1927.393447] ext4_tmpfile+0x187/0x4e0 [ 1927.397267] ? ext4_orphan_add+0xdb0/0xdb0 [ 1927.401512] ? security_inode_permission+0xd2/0x100 [ 1927.406562] ? inode_permission+0xb2/0x560 [ 1927.410806] vfs_tmpfile+0x13b/0x2a0 [ 1927.414538] ovl_fill_super+0xe70/0x3f7b [ 1927.418629] ? ovl_show_options+0x550/0x550 [ 1927.422951] ? __free_pages+0x103/0x190 [ 1927.426944] ? selinux_sb_copy_data+0x602/0x740 [ 1927.431639] ? selinux_capable+0x36/0x40 [ 1927.435710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1927.441261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1927.446812] ? get_anon_bdev+0xc0/0xc0 [ 1927.450708] ? sget+0x113/0x150 [ 1927.453997] ? ovl_show_options+0x550/0x550 [ 1927.458322] mount_nodev+0x6b/0x110 [ 1927.461962] ovl_mount+0x2c/0x40 [ 1927.465346] mount_fs+0xae/0x31d [ 1927.468728] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1927.473330] ? may_umount+0xb0/0xb0 [ 1927.476966] ? _raw_read_unlock+0x2c/0x50 [ 1927.481120] ? __get_fs_type+0x97/0xc0 [ 1927.485023] do_mount+0x581/0x31f0 [ 1927.488573] ? check_preemption_disabled+0x48/0x280 [ 1927.493612] ? copy_mount_string+0x40/0x40 [ 1927.497924] ? copy_mount_options+0x5f/0x430 [ 1927.502356] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1927.507404] ? kmem_cache_alloc_trace+0x353/0x750 [ 1927.512260] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1927.517816] ? _copy_from_user+0xdf/0x150 [ 1927.521985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1927.527528] ? copy_mount_options+0x315/0x430 [ 1927.532062] ksys_mount+0x12d/0x140 [ 1927.535706] __x64_sys_mount+0xbe/0x150 [ 1927.539692] do_syscall_64+0x1b9/0x820 [ 1927.543600] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1927.548978] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1927.553913] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1927.558765] ? trace_hardirqs_on_caller+0x310/0x310 [ 1927.563792] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1927.568826] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1927.573891] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1927.578759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1927.583955] RIP: 0033:0x457569 [ 1927.587154] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1927.606063] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1927.613787] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1927.621059] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1927.628330] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 03:56:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}}, 0x1c) close(r1) 03:56:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xbf7}, 0x28) [ 1927.635693] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1927.642965] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:56:01 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x8000a0ffffffff]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:56:01 executing program 5 (fault-call:2 fault-nth:50): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:56:01 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x3f00]}}]}, 0x80}}, 0x0) 03:56:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x719}, 0x28) 03:56:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x80e}, 0x28) [ 1927.821042] FAULT_INJECTION: forcing a failure. [ 1927.821042] name failslab, interval 1, probability 0, space 0, times 0 [ 1927.833328] CPU: 1 PID: 12897 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1927.840294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1927.849659] Call Trace: [ 1927.852495] dump_stack+0x244/0x39d [ 1927.856388] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1927.861620] ? debug_smp_processor_id+0x1c/0x20 [ 1927.866318] ? perf_trace_lock+0x14d/0x7a0 [ 1927.870582] should_fail.cold.4+0xa/0x17 [ 1927.874755] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1927.880001] ? debug_smp_processor_id+0x1c/0x20 [ 1927.884676] ? perf_trace_lock+0x14d/0x7a0 [ 1927.888926] ? find_held_lock+0x36/0x1c0 [ 1927.892999] ? zap_class+0x640/0x640 [ 1927.896729] ? mntput_no_expire+0x1ba/0xc00 [ 1927.901065] ? find_held_lock+0x36/0x1c0 [ 1927.905137] ? __lock_is_held+0xb5/0x140 [ 1927.909243] ? perf_trace_sched_process_exec+0x860/0x860 [ 1927.914700] ? rcu_softirq_qs+0x20/0x20 [ 1927.918696] __should_failslab+0x124/0x180 [ 1927.922944] should_failslab+0x9/0x14 [ 1927.926753] __kmalloc_track_caller+0x2d0/0x750 [ 1927.931430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1927.936973] ? check_preemption_disabled+0x48/0x280 [ 1927.942002] ? ovl_fill_super+0x12bf/0x3f7b [ 1927.946338] kstrdup+0x39/0x70 [ 1927.949545] ovl_fill_super+0x12bf/0x3f7b [ 1927.953754] ? ovl_show_options+0x550/0x550 [ 1927.958084] ? __free_pages+0x100/0x190 [ 1927.962082] ? selinux_sb_copy_data+0x602/0x740 [ 1927.966781] ? selinux_capable+0x36/0x40 [ 1927.970860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1927.976415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1927.981975] ? get_anon_bdev+0xc0/0xc0 [ 1927.985897] ? sget+0x113/0x150 [ 1927.989194] ? ovl_show_options+0x550/0x550 [ 1927.993521] mount_nodev+0x6b/0x110 [ 1927.997334] ovl_mount+0x2c/0x40 [ 1928.000731] mount_fs+0xae/0x31d [ 1928.004127] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1928.008722] ? may_umount+0xb0/0xb0 [ 1928.012371] ? _raw_read_unlock+0x2c/0x50 [ 1928.016543] ? __get_fs_type+0x97/0xc0 [ 1928.020451] do_mount+0x581/0x31f0 [ 1928.023995] ? check_preemption_disabled+0x48/0x280 [ 1928.029031] ? copy_mount_string+0x40/0x40 [ 1928.033288] ? copy_mount_options+0x5f/0x430 [ 1928.037703] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1928.042727] ? kmem_cache_alloc_trace+0x353/0x750 [ 1928.047593] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1928.053138] ? _copy_from_user+0xdf/0x150 [ 1928.057326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1928.062922] ? copy_mount_options+0x315/0x430 [ 1928.067439] ksys_mount+0x12d/0x140 [ 1928.071078] __x64_sys_mount+0xbe/0x150 [ 1928.075281] do_syscall_64+0x1b9/0x820 [ 1928.079180] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1928.084561] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1928.089504] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1928.094357] ? trace_hardirqs_on_caller+0x310/0x310 [ 1928.099392] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1928.104417] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1928.109450] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1928.114315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1928.119516] RIP: 0033:0x457569 [ 1928.122722] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1928.141628] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1928.149347] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1928.156624] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1928.163895] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1928.171167] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1928.178439] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:56:01 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x100000000000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:56:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xc9}, 0x28) 03:56:01 executing program 5 (fault-call:2 fault-nth:51): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:56:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x6e5}, 0x28) 03:56:01 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}]}, 0x80}}, 0x0) [ 1928.372938] FAULT_INJECTION: forcing a failure. [ 1928.372938] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1928.385199] CPU: 0 PID: 12923 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1928.392140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1928.401497] Call Trace: [ 1928.404109] dump_stack+0x244/0x39d [ 1928.407752] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1928.412955] ? lock_is_held_type+0x210/0x210 [ 1928.417382] should_fail.cold.4+0xa/0x17 [ 1928.421457] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1928.426566] ? perf_trace_lock+0x14d/0x7a0 [ 1928.430810] ? print_usage_bug+0xc0/0xc0 [ 1928.434926] ? print_usage_bug+0xc0/0xc0 [ 1928.438997] ? print_usage_bug+0xc0/0xc0 [ 1928.443074] ? zap_class+0x640/0x640 [ 1928.446799] ? print_usage_bug+0xc0/0xc0 [ 1928.450881] ? mark_held_locks+0xc7/0x130 [ 1928.455037] ? zap_class+0x640/0x640 [ 1928.458770] ? check_preemption_disabled+0x48/0x280 [ 1928.463798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1928.469343] ? should_fail+0x22d/0xd01 [ 1928.473243] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1928.478369] __alloc_pages_nodemask+0x34b/0xde0 [ 1928.483057] ? __alloc_pages_slowpath+0x2d70/0x2d70 [ 1928.488079] ? __lock_is_held+0xb5/0x140 [ 1928.492189] ? trace_hardirqs_off+0xb8/0x310 [ 1928.496618] cache_grow_begin+0xa5/0x8c0 [ 1928.500683] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1928.506243] ? check_preemption_disabled+0x48/0x280 [ 1928.511276] __kmalloc+0x694/0x760 [ 1928.514833] ? ext4_xattr_block_set+0xa94/0x4490 [ 1928.519625] ext4_xattr_block_set+0xa94/0x4490 [ 1928.524306] ? ext4_xattr_block_find.isra.20+0x720/0x720 [ 1928.529761] ? zap_class+0x640/0x640 [ 1928.533482] ? check_preemption_disabled+0x48/0x280 [ 1928.538523] ? debug_smp_processor_id+0x1c/0x20 [ 1928.543200] ? ext4_xattr_ibody_set+0x2c0/0x2c0 [ 1928.547896] ? __lock_is_held+0xb5/0x140 [ 1928.551994] ? perf_trace_sched_process_exec+0x860/0x860 [ 1928.557455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1928.562997] ? ext4_xattr_check_entries+0x133/0x430 [ 1928.568025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1928.573569] ? xattr_find_entry+0x1e4/0x280 [ 1928.577919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1928.583464] ? ext4_xattr_ibody_set+0x1ec/0x2c0 [ 1928.588142] ext4_xattr_set_handle+0xff4/0x1650 [ 1928.592832] ? ext4_xattr_ibody_inline_set+0x2c0/0x2c0 [ 1928.598139] ? __might_sleep+0x95/0x190 [ 1928.602120] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1928.607666] ? ext4_journal_check_start+0x18e/0x220 [ 1928.612691] ? ext4_xattr_set+0x1f7/0x420 [ 1928.616867] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 1928.622615] ext4_xattr_set+0x248/0x420 [ 1928.626609] ? ext4_xattr_set_credits+0x120/0x120 [ 1928.631465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1928.637060] ? evm_protected_xattr+0x206/0x290 [ 1928.641660] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 1928.646690] ? ext4_xattr_destroy_cache+0x30/0x30 [ 1928.651538] ext4_xattr_trusted_set+0x36/0x40 [ 1928.656058] __vfs_setxattr+0x124/0x180 [ 1928.660050] ? xattr_resolve_name+0x430/0x430 [ 1928.664573] __vfs_setxattr_noperm+0x11d/0x410 [ 1928.669188] vfs_setxattr+0xd8/0x100 [ 1928.672925] ovl_fill_super+0xf26/0x3f7b [ 1928.677021] ? ovl_show_options+0x550/0x550 [ 1928.681361] ? __free_pages+0x103/0x190 [ 1928.685342] ? selinux_sb_copy_data+0x602/0x740 [ 1928.690035] ? selinux_capable+0x36/0x40 [ 1928.694105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1928.699656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1928.705208] ? get_anon_bdev+0xc0/0xc0 [ 1928.709100] ? sget+0x113/0x150 [ 1928.712391] ? ovl_show_options+0x550/0x550 [ 1928.716721] mount_nodev+0x6b/0x110 [ 1928.720359] ovl_mount+0x2c/0x40 [ 1928.723742] mount_fs+0xae/0x31d [ 1928.727141] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1928.731766] ? may_umount+0xb0/0xb0 [ 1928.735399] ? _raw_read_unlock+0x2c/0x50 [ 1928.739566] ? __get_fs_type+0x97/0xc0 [ 1928.743482] do_mount+0x581/0x31f0 [ 1928.747053] ? trace_hardirqs_on+0x310/0x310 [ 1928.751473] ? copy_mount_string+0x40/0x40 [ 1928.755729] ? retint_kernel+0x2d/0x2d [ 1928.759642] ? copy_mount_options+0x25c/0x430 [ 1928.764144] ? audit_kill_trees+0x460/0x460 [ 1928.768496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1928.774042] ? copy_mount_options+0x315/0x430 [ 1928.778729] ksys_mount+0x12d/0x140 [ 1928.782372] __x64_sys_mount+0xbe/0x150 [ 1928.786357] do_syscall_64+0x1b9/0x820 [ 1928.790252] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1928.795626] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1928.800559] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1928.805413] ? trace_hardirqs_on_caller+0x310/0x310 [ 1928.810462] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1928.815492] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1928.820521] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1928.825384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1928.830578] RIP: 0033:0x457569 [ 1928.833781] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1928.852693] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1928.860412] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1928.867684] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1928.874963] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1928.882252] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1928.889527] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:56:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1802000000000000]}}, 0x1c) close(r1) 03:56:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x907}, 0x28) 03:56:02 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xa0010000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:56:02 executing program 5 (fault-call:2 fault-nth:52): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:56:02 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x3f000000]}}]}, 0x80}}, 0x0) 03:56:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xc0}, 0x28) 03:56:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa38}, 0x28) [ 1929.078312] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1929.106273] FAULT_INJECTION: forcing a failure. [ 1929.106273] name failslab, interval 1, probability 0, space 0, times 0 03:56:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xd1f}, 0x28) [ 1929.145912] CPU: 0 PID: 12942 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1929.152901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1929.162269] Call Trace: [ 1929.164898] dump_stack+0x244/0x39d [ 1929.168547] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1929.173780] ? __find_get_block+0xba8/0xf20 [ 1929.178126] ? __find_get_block+0xba8/0xf20 [ 1929.182476] should_fail.cold.4+0xa/0x17 [ 1929.186549] ? __brelse+0x104/0x180 [ 1929.190220] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1929.195331] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1929.195351] ? check_preemption_disabled+0x48/0x280 [ 1929.195377] ? __find_get_block+0x3be/0xf20 [ 1929.195397] ? zap_class+0x640/0x640 [ 1929.195416] ? __lock_is_held+0xb5/0x140 [ 1929.218070] ? __lock_is_held+0xb5/0x140 [ 1929.222161] ? perf_trace_sched_process_exec+0x860/0x860 [ 1929.227617] ? __getblk_gfp+0x11b/0xd50 [ 1929.231594] ? ext4_xattr_block_find.isra.20+0x720/0x720 [ 1929.237053] ? mount_fs+0xae/0x31d [ 1929.240598] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 1929.245378] ? do_mount+0x581/0x31f0 [ 1929.249101] ? ksys_mount+0x12d/0x140 [ 1929.252909] ? __x64_sys_mount+0xbe/0x150 [ 1929.257076] __should_failslab+0x124/0x180 [ 1929.261328] should_failslab+0x9/0x14 [ 1929.265136] kmem_cache_alloc+0x2be/0x730 [ 1929.269299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1929.274861] mb_cache_entry_create+0x143/0xb30 [ 1929.279466] ? mb_cache_shrink+0xae0/0xae0 [ 1929.283707] ? var_wake_function+0x150/0x150 [ 1929.288126] ? perf_trace_sched_process_exec+0x860/0x860 [ 1929.293607] ? ext4_should_retry_alloc+0x220/0x220 [ 1929.298560] ext4_xattr_block_set+0x1f3d/0x4490 [ 1929.303240] ? ext4_xattr_block_find.isra.20+0x720/0x720 [ 1929.308697] ? zap_class+0x640/0x640 [ 1929.312423] ? check_preemption_disabled+0x48/0x280 [ 1929.317468] ? ext4_xattr_ibody_set+0x2c0/0x2c0 [ 1929.322163] ? __lock_is_held+0xb5/0x140 [ 1929.326261] ? perf_trace_sched_process_exec+0x860/0x860 [ 1929.331723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1929.337292] ? ext4_xattr_check_entries+0x133/0x430 [ 1929.342320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1929.347880] ? xattr_find_entry+0x1e4/0x280 [ 1929.352229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1929.357769] ? ext4_xattr_ibody_set+0x1ec/0x2c0 [ 1929.362454] ext4_xattr_set_handle+0xff4/0x1650 [ 1929.367144] ? ext4_xattr_ibody_inline_set+0x2c0/0x2c0 [ 1929.372439] ? __might_sleep+0x95/0x190 [ 1929.376423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1929.381969] ? ext4_journal_check_start+0x18e/0x220 [ 1929.386994] ? ext4_xattr_set+0x1f7/0x420 [ 1929.391154] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 1929.396902] ext4_xattr_set+0x248/0x420 [ 1929.400913] ? ext4_xattr_set_credits+0x120/0x120 [ 1929.405770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1929.411330] ? evm_protected_xattr+0x206/0x290 [ 1929.415925] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 1929.420956] ? ext4_xattr_destroy_cache+0x30/0x30 [ 1929.425805] ext4_xattr_trusted_set+0x36/0x40 [ 1929.430316] __vfs_setxattr+0x124/0x180 [ 1929.434301] ? xattr_resolve_name+0x430/0x430 [ 1929.438816] __vfs_setxattr_noperm+0x11d/0x410 [ 1929.443436] vfs_setxattr+0xd8/0x100 [ 1929.447164] ovl_fill_super+0xf26/0x3f7b [ 1929.451257] ? ovl_show_options+0x550/0x550 [ 1929.455612] ? __free_pages+0x103/0x190 [ 1929.459591] ? selinux_sb_copy_data+0x602/0x740 [ 1929.464293] ? selinux_capable+0x36/0x40 [ 1929.468379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1929.473932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1929.479494] ? get_anon_bdev+0xc0/0xc0 [ 1929.483419] ? sget+0x113/0x150 [ 1929.486731] ? ovl_show_options+0x550/0x550 [ 1929.491060] mount_nodev+0x6b/0x110 [ 1929.494696] ovl_mount+0x2c/0x40 [ 1929.498070] mount_fs+0xae/0x31d [ 1929.501452] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1929.506062] ? may_umount+0xb0/0xb0 [ 1929.509706] ? _raw_read_unlock+0x2c/0x50 [ 1929.513866] ? __get_fs_type+0x97/0xc0 [ 1929.517781] do_mount+0x581/0x31f0 [ 1929.521326] ? check_preemption_disabled+0x48/0x280 [ 1929.526357] ? copy_mount_string+0x40/0x40 [ 1929.530615] ? copy_mount_options+0x5f/0x430 [ 1929.535026] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1929.540049] ? kmem_cache_alloc_trace+0x353/0x750 [ 1929.544928] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1929.550511] ? _copy_from_user+0xdf/0x150 [ 1929.554675] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1929.560229] ? copy_mount_options+0x315/0x430 [ 1929.564741] ksys_mount+0x12d/0x140 [ 1929.568383] __x64_sys_mount+0xbe/0x150 [ 1929.572370] do_syscall_64+0x1b9/0x820 [ 1929.576267] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1929.581665] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1929.586599] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1929.591452] ? trace_hardirqs_on_caller+0x310/0x310 [ 1929.596473] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1929.601497] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1929.606544] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1929.611417] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1929.616619] RIP: 0033:0x457569 [ 1929.619820] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1929.638757] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:56:03 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x500]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1929.646474] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1929.653750] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1929.661021] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1929.668292] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1929.675563] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:56:03 executing program 5 (fault-call:2 fault-nth:53): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 1929.710030] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:56:03 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x5000000]}}]}, 0x80}}, 0x0) 03:56:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x983a0000]}}, 0x1c) close(r1) 03:56:03 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x14b4}, 0x28) 03:56:03 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x3f000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:56:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x829}, 0x28) [ 1929.852185] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1929.889984] FAULT_INJECTION: forcing a failure. [ 1929.889984] name failslab, interval 1, probability 0, space 0, times 0 [ 1929.934249] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1929.982838] CPU: 0 PID: 12964 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1929.989846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1929.999233] Call Trace: [ 1930.001860] dump_stack+0x244/0x39d [ 1930.005538] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1930.010752] ? debug_smp_processor_id+0x1c/0x20 [ 1930.015437] ? perf_trace_lock+0x14d/0x7a0 [ 1930.019699] should_fail.cold.4+0xa/0x17 [ 1930.023793] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1930.028917] ? debug_smp_processor_id+0x1c/0x20 [ 1930.033598] ? perf_trace_lock+0x14d/0x7a0 [ 1930.037864] ? find_held_lock+0x36/0x1c0 [ 1930.041946] ? zap_class+0x640/0x640 [ 1930.045673] ? mntput_no_expire+0x1ba/0xc00 [ 1930.050006] ? find_held_lock+0x36/0x1c0 [ 1930.054078] ? __lock_is_held+0xb5/0x140 [ 1930.058148] ? ttwu_stat.part.59+0x138/0x610 [ 1930.062583] ? perf_trace_sched_process_exec+0x860/0x860 [ 1930.068039] ? rcu_softirq_qs+0x20/0x20 [ 1930.072035] __should_failslab+0x124/0x180 [ 1930.076461] should_failslab+0x9/0x14 [ 1930.080269] __kmalloc_track_caller+0x2d0/0x750 [ 1930.084944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1930.090490] ? check_preemption_disabled+0x48/0x280 [ 1930.095517] ? ovl_fill_super+0x12bf/0x3f7b [ 1930.099859] kstrdup+0x39/0x70 [ 1930.103073] ovl_fill_super+0x12bf/0x3f7b [ 1930.107265] ? ovl_show_options+0x550/0x550 [ 1930.111597] ? __free_pages+0x100/0x190 [ 1930.115606] ? selinux_sb_copy_data+0x602/0x740 [ 1930.120306] ? selinux_capable+0x36/0x40 [ 1930.124380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1930.129940] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1930.135523] ? get_anon_bdev+0xc0/0xc0 [ 1930.139433] ? sget+0x113/0x150 [ 1930.142724] ? ovl_show_options+0x550/0x550 [ 1930.147053] mount_nodev+0x6b/0x110 [ 1930.150693] ovl_mount+0x2c/0x40 [ 1930.154071] mount_fs+0xae/0x31d [ 1930.157452] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1930.162045] ? may_umount+0xb0/0xb0 [ 1930.165678] ? _raw_read_unlock+0x2c/0x50 [ 1930.169830] ? __get_fs_type+0x97/0xc0 [ 1930.173740] do_mount+0x581/0x31f0 [ 1930.177287] ? check_preemption_disabled+0x48/0x280 [ 1930.182337] ? copy_mount_string+0x40/0x40 [ 1930.186608] ? copy_mount_options+0x5f/0x430 [ 1930.191037] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1930.196060] ? kmem_cache_alloc_trace+0x353/0x750 [ 1930.200917] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1930.206474] ? _copy_from_user+0xdf/0x150 [ 1930.210631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1930.216176] ? copy_mount_options+0x315/0x430 [ 1930.220705] ksys_mount+0x12d/0x140 [ 1930.224350] __x64_sys_mount+0xbe/0x150 [ 1930.228351] do_syscall_64+0x1b9/0x820 [ 1930.232260] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1930.237634] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1930.242573] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1930.247424] ? trace_hardirqs_on_caller+0x310/0x310 [ 1930.252449] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1930.257484] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1930.262519] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1930.267390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1930.272589] RIP: 0033:0x457569 [ 1930.275806] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1930.294712] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1930.303394] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1930.310674] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1930.317946] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1930.325225] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 03:56:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00]}}, 0x1c) close(r1) 03:56:03 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x2]}}]}, 0x80}}, 0x0) 03:56:03 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x147c}, 0x28) [ 1930.332504] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 [ 1930.374053] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:56:03 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x4000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:56:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa7a}, 0x28) 03:56:03 executing program 5 (fault-call:2 fault-nth:54): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 1930.463842] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:56:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}, 0x1c) close(r1) 03:56:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x1a0ffffffff]}}]}, 0x80}}, 0x0) 03:56:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1129}, 0x28) [ 1930.582127] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:56:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x17d}, 0x28) [ 1930.641219] FAULT_INJECTION: forcing a failure. [ 1930.641219] name failslab, interval 1, probability 0, space 0, times 0 [ 1930.657969] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1930.690143] CPU: 0 PID: 12997 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1930.697107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1930.706468] Call Trace: [ 1930.709073] dump_stack+0x244/0x39d [ 1930.709101] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1930.709131] ? debug_smp_processor_id+0x1c/0x20 [ 1930.722612] ? perf_trace_lock+0x14d/0x7a0 [ 1930.726895] should_fail.cold.4+0xa/0x17 [ 1930.731006] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1930.736124] ? debug_smp_processor_id+0x1c/0x20 [ 1930.740802] ? perf_trace_lock+0x14d/0x7a0 [ 1930.745049] ? find_held_lock+0x36/0x1c0 [ 1930.749115] ? zap_class+0x640/0x640 [ 1930.752841] ? mntput_no_expire+0x1ba/0xc00 [ 1930.757224] ? find_held_lock+0x36/0x1c0 [ 1930.761298] ? __lock_is_held+0xb5/0x140 [ 1930.765390] ? perf_trace_sched_process_exec+0x860/0x860 [ 1930.770857] ? rcu_softirq_qs+0x20/0x20 [ 1930.774886] __should_failslab+0x124/0x180 [ 1930.779137] should_failslab+0x9/0x14 [ 1930.782948] __kmalloc_track_caller+0x2d0/0x750 [ 1930.787624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1930.793169] ? check_preemption_disabled+0x48/0x280 [ 1930.798201] ? ovl_fill_super+0x12bf/0x3f7b [ 1930.802537] kstrdup+0x39/0x70 [ 1930.805742] ovl_fill_super+0x12bf/0x3f7b [ 1930.809927] ? ovl_show_options+0x550/0x550 [ 1930.814272] ? __free_pages+0x100/0x190 [ 1930.818257] ? selinux_sb_copy_data+0x602/0x740 [ 1930.822948] ? selinux_capable+0x36/0x40 [ 1930.827017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1930.832570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1930.838130] ? get_anon_bdev+0xc0/0xc0 [ 1930.842028] ? sget+0x113/0x150 [ 1930.845321] ? ovl_show_options+0x550/0x550 [ 1930.849652] mount_nodev+0x6b/0x110 [ 1930.853301] ovl_mount+0x2c/0x40 [ 1930.856701] mount_fs+0xae/0x31d [ 1930.860120] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1930.864747] ? may_umount+0xb0/0xb0 [ 1930.868383] ? _raw_read_unlock+0x2c/0x50 [ 1930.872560] ? __get_fs_type+0x97/0xc0 [ 1930.876463] do_mount+0x581/0x31f0 [ 1930.880027] ? check_preemption_disabled+0x48/0x280 [ 1930.885070] ? copy_mount_string+0x40/0x40 [ 1930.889328] ? copy_mount_options+0x5f/0x430 [ 1930.893756] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1930.898778] ? kmem_cache_alloc_trace+0x353/0x750 [ 1930.903637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1930.909180] ? copy_mount_options+0x315/0x430 [ 1930.913686] ksys_mount+0x12d/0x140 [ 1930.917324] __x64_sys_mount+0xbe/0x150 [ 1930.921315] do_syscall_64+0x1b9/0x820 [ 1930.925226] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1930.930625] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1930.935581] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1930.940445] ? trace_hardirqs_on_caller+0x310/0x310 [ 1930.945483] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1930.950507] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1930.955546] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1930.960442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1930.965638] RIP: 0033:0x457569 [ 1930.969324] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:56:04 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x8000a0]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1930.988228] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1930.995945] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1931.003216] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1931.010492] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1931.017762] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1931.025032] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:56:04 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}}, 0x1c) close(r1) 03:56:04 executing program 5 (fault-call:2 fault-nth:55): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:56:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0xa0008000]}}]}, 0x80}}, 0x0) 03:56:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xfdf}, 0x28) 03:56:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xbfe}, 0x28) 03:56:04 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xffffffef]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1931.197771] FAULT_INJECTION: forcing a failure. [ 1931.197771] name failslab, interval 1, probability 0, space 0, times 0 [ 1931.244090] CPU: 1 PID: 13020 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1931.251079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1931.260569] Call Trace: [ 1931.263187] dump_stack+0x244/0x39d [ 1931.266837] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1931.272060] ? debug_smp_processor_id+0x1c/0x20 [ 1931.276745] ? perf_trace_lock+0x14d/0x7a0 [ 1931.281008] should_fail.cold.4+0xa/0x17 [ 1931.285100] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1931.290216] ? debug_smp_processor_id+0x1c/0x20 [ 1931.294895] ? perf_trace_lock+0x14d/0x7a0 [ 1931.299143] ? find_held_lock+0x36/0x1c0 [ 1931.303211] ? zap_class+0x640/0x640 [ 1931.306938] ? mntput_no_expire+0x1ba/0xc00 [ 1931.311271] ? find_held_lock+0x36/0x1c0 [ 1931.315346] ? __lock_is_held+0xb5/0x140 [ 1931.319528] ? hiddev_ioctl+0x1088/0x1ea0 [ 1931.323829] ? perf_trace_sched_process_exec+0x860/0x860 [ 1931.329308] ? rcu_softirq_qs+0x20/0x20 [ 1931.333426] __should_failslab+0x124/0x180 [ 1931.337698] should_failslab+0x9/0x14 [ 1931.341506] __kmalloc_track_caller+0x2d0/0x750 [ 1931.346186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1931.351731] ? check_preemption_disabled+0x48/0x280 [ 1931.356771] ? ovl_fill_super+0x12bf/0x3f7b [ 1931.361102] kstrdup+0x39/0x70 [ 1931.364306] ovl_fill_super+0x12bf/0x3f7b [ 1931.368560] ? ovl_show_options+0x550/0x550 [ 1931.372891] ? __free_pages+0x100/0x190 [ 1931.376880] ? selinux_sb_copy_data+0x602/0x740 [ 1931.381573] ? selinux_capable+0x36/0x40 [ 1931.385644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1931.391194] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1931.396745] ? get_anon_bdev+0xc0/0xc0 [ 1931.400651] ? sget+0x113/0x150 [ 1931.403942] ? ovl_show_options+0x550/0x550 [ 1931.408270] mount_nodev+0x6b/0x110 [ 1931.411922] ovl_mount+0x2c/0x40 [ 1931.415314] mount_fs+0xae/0x31d [ 1931.418749] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1931.423341] ? may_umount+0xb0/0xb0 [ 1931.426980] ? _raw_read_unlock+0x3f/0x50 [ 1931.431140] ? __get_fs_type+0x97/0xc0 [ 1931.435158] do_mount+0x581/0x31f0 [ 1931.438706] ? retint_kernel+0x1b/0x2d [ 1931.442599] ? trace_hardirqs_on+0x310/0x310 [ 1931.447023] ? copy_mount_string+0x40/0x40 [ 1931.451271] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1931.456047] ? retint_kernel+0x2d/0x2d [ 1931.459957] ? copy_mount_options+0x281/0x430 [ 1931.464462] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1931.469311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1931.474861] ? copy_mount_options+0x315/0x430 [ 1931.479381] ksys_mount+0x12d/0x140 [ 1931.483020] __x64_sys_mount+0xbe/0x150 [ 1931.487011] do_syscall_64+0x1b9/0x820 [ 1931.490918] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1931.496303] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1931.501252] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1931.506100] ? trace_hardirqs_on_caller+0x310/0x310 [ 1931.511124] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1931.516254] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1931.521290] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1931.526154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1931.531352] RIP: 0033:0x457569 [ 1931.534557] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1931.553460] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1931.561188] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1931.568466] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1931.575746] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1931.583019] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 03:56:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x468}, 0x28) [ 1931.590325] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:56:05 executing program 5 (fault-call:2 fault-nth:56): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:56:05 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x1a0]}}]}, 0x80}}, 0x0) [ 1931.696816] FAULT_INJECTION: forcing a failure. [ 1931.696816] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1931.708691] CPU: 1 PID: 13038 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1931.715632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1931.725001] Call Trace: [ 1931.727611] dump_stack+0x244/0x39d [ 1931.731272] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1931.736501] ? zap_class+0x640/0x640 [ 1931.740256] should_fail.cold.4+0xa/0x17 [ 1931.744331] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1931.749465] ? mark_held_locks+0x130/0x130 [ 1931.753708] ? lock_downgrade+0x900/0x900 [ 1931.757872] ? check_preemption_disabled+0x48/0x280 [ 1931.762913] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1931.767869] ? kasan_check_read+0x11/0x20 [ 1931.772038] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1931.777333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1931.782898] ? check_preemption_disabled+0x48/0x280 [ 1931.787959] ? debug_smp_processor_id+0x1c/0x20 [ 1931.792645] ? perf_trace_lock+0x14d/0x7a0 [ 1931.796897] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1931.802457] ? should_fail+0x22d/0xd01 [ 1931.806359] ? lock_is_held_type+0x210/0x210 [ 1931.810792] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1931.815905] ? unwind_get_return_address+0x61/0xa0 [ 1931.820868] __alloc_pages_nodemask+0x34b/0xde0 [ 1931.825561] ? __alloc_pages_slowpath+0x2d70/0x2d70 [ 1931.830591] ? save_stack+0xa9/0xd0 [ 1931.834237] ? find_held_lock+0x36/0x1c0 [ 1931.838341] ? trace_hardirqs_off+0xb8/0x310 [ 1931.842776] cache_grow_begin+0xa5/0x8c0 [ 1931.846868] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1931.852427] ? check_preemption_disabled+0x48/0x280 [ 1931.857472] kmem_cache_alloc+0x66b/0x730 [ 1931.861670] getname_kernel+0x54/0x370 [ 1931.865582] kern_path+0x1e/0x40 [ 1931.868972] ovl_mount_dir_noesc+0x6b/0x190 [ 1931.873313] ovl_fill_super+0x1d03/0x3f7b [ 1931.877504] ? ovl_show_options+0x550/0x550 [ 1931.881840] ? __free_pages+0x100/0x190 [ 1931.885843] ? selinux_sb_copy_data+0x602/0x740 [ 1931.890551] ? selinux_capable+0x36/0x40 [ 1931.894625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1931.900192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1931.905749] ? get_anon_bdev+0xc0/0xc0 [ 1931.909655] ? sget+0x113/0x150 [ 1931.912950] ? ovl_show_options+0x550/0x550 [ 1931.917279] mount_nodev+0x6b/0x110 [ 1931.920923] ovl_mount+0x2c/0x40 [ 1931.924304] mount_fs+0xae/0x31d [ 1931.927689] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1931.932284] ? may_umount+0xb0/0xb0 [ 1931.935918] ? _raw_read_unlock+0x2c/0x50 [ 1931.940076] ? __get_fs_type+0x97/0xc0 [ 1931.943980] do_mount+0x581/0x31f0 [ 1931.947552] ? check_preemption_disabled+0x48/0x280 [ 1931.952585] ? copy_mount_string+0x40/0x40 [ 1931.956845] ? copy_mount_options+0x5f/0x430 [ 1931.961301] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1931.966329] ? kmem_cache_alloc_trace+0x353/0x750 [ 1931.971184] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1931.976729] ? _copy_from_user+0xdf/0x150 [ 1931.980893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1931.986484] ? copy_mount_options+0x315/0x430 [ 1931.990995] ksys_mount+0x12d/0x140 [ 1931.994656] __x64_sys_mount+0xbe/0x150 [ 1931.998656] do_syscall_64+0x1b9/0x820 [ 1932.002574] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1932.007951] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1932.012890] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1932.017743] ? trace_hardirqs_on_caller+0x310/0x310 [ 1932.022772] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1932.027805] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1932.032665] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1932.037867] RIP: 0033:0x457569 [ 1932.041098] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1932.060004] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1932.067719] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1932.075468] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1932.082740] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1932.090015] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 03:56:05 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xffffffffa0008000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:56:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x9c1}, 0x28) 03:56:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1146}, 0x28) [ 1932.097285] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:56:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14280000000000]}}, 0x1c) close(r1) 03:56:05 executing program 5 (fault-call:2 fault-nth:57): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:56:05 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0xff3f0000]}}]}, 0x80}}, 0x0) [ 1932.239892] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:56:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x928}, 0x28) 03:56:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}}, 0x1c) close(r1) [ 1932.306936] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:56:05 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x4]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:56:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x337}, 0x28) 03:56:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x12e}, 0x28) [ 1932.425248] FAULT_INJECTION: forcing a failure. [ 1932.425248] name failslab, interval 1, probability 0, space 0, times 0 [ 1932.494381] CPU: 0 PID: 13066 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1932.501404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1932.510785] Call Trace: [ 1932.513395] dump_stack+0x244/0x39d [ 1932.517040] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1932.522241] ? debug_smp_processor_id+0x1c/0x20 [ 1932.526920] ? perf_trace_lock+0x14d/0x7a0 [ 1932.531172] should_fail.cold.4+0xa/0x17 [ 1932.535249] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1932.540377] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1932.545487] ? zap_class+0x640/0x640 [ 1932.549210] ? __percpu_counter_sum+0x135/0x1a0 [ 1932.553906] ? find_held_lock+0x36/0x1c0 [ 1932.557981] ? __lock_is_held+0xb5/0x140 [ 1932.562073] ? perf_trace_sched_process_exec+0x860/0x860 [ 1932.567528] ? vfs_statfs+0x287/0x2e0 [ 1932.571342] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1932.576910] __should_failslab+0x124/0x180 [ 1932.581168] should_failslab+0x9/0x14 [ 1932.584974] __kmalloc+0x2d4/0x760 [ 1932.588533] ? ovl_fill_super+0x23ca/0x3f7b [ 1932.592886] ovl_fill_super+0x23ca/0x3f7b [ 1932.597074] ? ovl_show_options+0x550/0x550 [ 1932.601402] ? __free_pages+0x100/0x190 [ 1932.605388] ? selinux_sb_copy_data+0x602/0x740 [ 1932.610081] ? selinux_capable+0x36/0x40 [ 1932.614152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1932.619705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1932.625254] ? get_anon_bdev+0xc0/0xc0 [ 1932.629150] ? sget+0x113/0x150 [ 1932.632446] ? ovl_show_options+0x550/0x550 [ 1932.636777] mount_nodev+0x6b/0x110 [ 1932.640436] ovl_mount+0x2c/0x40 [ 1932.643828] mount_fs+0xae/0x31d [ 1932.647219] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1932.651816] ? may_umount+0xb0/0xb0 [ 1932.655461] ? _raw_read_unlock+0x2c/0x50 [ 1932.659613] ? __get_fs_type+0x97/0xc0 [ 1932.663517] do_mount+0x581/0x31f0 [ 1932.667060] ? check_preemption_disabled+0x48/0x280 [ 1932.672091] ? copy_mount_string+0x40/0x40 [ 1932.676346] ? copy_mount_options+0x5f/0x430 [ 1932.680766] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1932.685790] ? kmem_cache_alloc_trace+0x353/0x750 [ 1932.690645] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1932.696194] ? _copy_from_user+0xdf/0x150 [ 1932.700374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1932.705932] ? copy_mount_options+0x315/0x430 [ 1932.710446] ksys_mount+0x12d/0x140 [ 1932.714130] __x64_sys_mount+0xbe/0x150 [ 1932.718120] do_syscall_64+0x1b9/0x820 [ 1932.722014] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1932.727385] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1932.732323] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1932.737174] ? trace_hardirqs_on_caller+0x310/0x310 [ 1932.742200] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1932.747230] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1932.752264] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1932.757128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1932.762331] RIP: 0033:0x457569 [ 1932.765539] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1932.784472] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:56:06 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0xf]}}]}, 0x80}}, 0x0) 03:56:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xeb4}, 0x28) [ 1932.792191] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1932.799494] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1932.806768] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1932.814043] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1932.821318] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:56:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}, 0x1c) close(r1) 03:56:06 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xffffffff00000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:56:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x88d}, 0x28) 03:56:06 executing program 5 (fault-call:2 fault-nth:58): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 1933.020508] FAULT_INJECTION: forcing a failure. [ 1933.020508] name failslab, interval 1, probability 0, space 0, times 0 [ 1933.056834] CPU: 0 PID: 13097 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1933.063844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1933.073238] Call Trace: [ 1933.075862] dump_stack+0x244/0x39d [ 1933.079543] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1933.084760] ? debug_smp_processor_id+0x1c/0x20 [ 1933.089450] ? perf_trace_lock+0x14d/0x7a0 [ 1933.093726] should_fail.cold.4+0xa/0x17 [ 1933.097820] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1933.102970] ? save_stack+0x43/0xd0 [ 1933.106620] ? kasan_kmalloc+0xc7/0xe0 [ 1933.110531] ? __kmalloc+0x14e/0x760 [ 1933.114263] ? ovl_fill_super+0x23ca/0x3f7b [ 1933.118608] ? mount_nodev+0x6b/0x110 [ 1933.122432] ? zap_class+0x640/0x640 [ 1933.126163] ? do_mount+0x581/0x31f0 [ 1933.129903] ? __x64_sys_mount+0xbe/0x150 [ 1933.134072] ? do_syscall_64+0x1b9/0x820 [ 1933.138156] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1933.143573] ? find_held_lock+0x36/0x1c0 [ 1933.147665] ? __lock_is_held+0xb5/0x140 [ 1933.151795] ? perf_trace_sched_process_exec+0x860/0x860 [ 1933.157311] __should_failslab+0x124/0x180 [ 1933.161573] should_failslab+0x9/0x14 [ 1933.165396] __kmalloc+0x2d4/0x760 [ 1933.168969] ? ovl_fill_super+0x240e/0x3f7b [ 1933.173322] ovl_fill_super+0x240e/0x3f7b [ 1933.177520] ? ovl_show_options+0x550/0x550 [ 1933.181873] ? __free_pages+0x100/0x190 [ 1933.185909] ? selinux_sb_copy_data+0x602/0x740 [ 1933.190618] ? selinux_capable+0x36/0x40 [ 1933.194706] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1933.200270] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1933.205835] ? get_anon_bdev+0xc0/0xc0 [ 1933.209753] ? sget+0x113/0x150 [ 1933.213055] ? ovl_show_options+0x550/0x550 [ 1933.217402] mount_nodev+0x6b/0x110 [ 1933.221053] ovl_mount+0x2c/0x40 03:56:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x11b6}, 0x28) [ 1933.224476] mount_fs+0xae/0x31d [ 1933.227885] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1933.232489] ? may_umount+0xb0/0xb0 [ 1933.236133] ? _raw_read_unlock+0x2c/0x50 [ 1933.240300] ? __get_fs_type+0x97/0xc0 [ 1933.244195] do_mount+0x581/0x31f0 [ 1933.247748] ? check_preemption_disabled+0x48/0x280 [ 1933.252763] ? copy_mount_string+0x40/0x40 [ 1933.257035] ? copy_mount_options+0x5f/0x430 [ 1933.261436] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1933.266456] ? kmem_cache_alloc_trace+0x353/0x750 [ 1933.271323] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1933.276882] ? _copy_from_user+0xdf/0x150 [ 1933.281032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1933.286566] ? copy_mount_options+0x315/0x430 [ 1933.291079] ksys_mount+0x12d/0x140 [ 1933.294702] __x64_sys_mount+0xbe/0x150 [ 1933.298697] do_syscall_64+0x1b9/0x820 [ 1933.302580] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1933.307958] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1933.312897] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1933.317758] ? trace_hardirqs_on_caller+0x310/0x310 [ 1933.322768] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1933.327793] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1933.332820] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1933.337679] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1933.342872] RIP: 0033:0x457569 [ 1933.346071] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1933.364974] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:56:06 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x8000a0ffffffff]}}]}, 0x80}}, 0x0) 03:56:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x2a1}, 0x28) [ 1933.372695] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1933.379955] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1933.387213] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1933.394486] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1933.401763] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:56:06 executing program 5 (fault-call:2 fault-nth:59): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:56:07 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0xffffff7f00000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:56:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x108d}, 0x28) 03:56:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa9b}, 0x28) 03:56:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f]}}, 0x1c) close(r1) 03:56:07 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}]}, 0x80}}, 0x0) [ 1933.636318] FAULT_INJECTION: forcing a failure. [ 1933.636318] name failslab, interval 1, probability 0, space 0, times 0 [ 1933.675021] CPU: 1 PID: 13116 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1933.682019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1933.691395] Call Trace: [ 1933.694002] dump_stack+0x244/0x39d [ 1933.697643] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1933.702857] ? debug_smp_processor_id+0x1c/0x20 [ 1933.707535] ? perf_trace_lock+0x14d/0x7a0 [ 1933.711791] should_fail.cold.4+0xa/0x17 [ 1933.715880] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1933.720995] ? kasan_check_read+0x11/0x20 [ 1933.725153] ? do_raw_spin_unlock+0xa7/0x330 [ 1933.729580] ? zap_class+0x640/0x640 [ 1933.733305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1933.738888] ? find_held_lock+0x36/0x1c0 [ 1933.742977] ? __lock_is_held+0xb5/0x140 [ 1933.747056] ? __smpboot_create_thread.part.1+0x1d8/0x2c0 [ 1933.752627] ? perf_trace_sched_process_exec+0x860/0x860 [ 1933.758109] __should_failslab+0x124/0x180 [ 1933.762370] should_failslab+0x9/0x14 [ 1933.766190] __kmalloc+0x2d4/0x760 [ 1933.769741] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1933.774764] ? __kmalloc+0x5e4/0x760 [ 1933.778485] ? ovl_alloc_entry+0x24/0x70 [ 1933.782555] ovl_alloc_entry+0x24/0x70 [ 1933.786453] ovl_fill_super+0x29b1/0x3f7b [ 1933.790633] ? ovl_show_options+0x550/0x550 [ 1933.794964] ? __free_pages+0x100/0x190 [ 1933.798952] ? selinux_sb_copy_data+0x602/0x740 [ 1933.803645] ? selinux_capable+0x36/0x40 [ 1933.807740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1933.813297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1933.818884] ? get_anon_bdev+0xc0/0xc0 [ 1933.822782] ? sget+0x113/0x150 [ 1933.826085] ? ovl_show_options+0x550/0x550 [ 1933.830420] mount_nodev+0x6b/0x110 [ 1933.834061] ovl_mount+0x2c/0x40 [ 1933.837443] mount_fs+0xae/0x31d [ 1933.840829] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1933.845440] ? may_umount+0xb0/0xb0 [ 1933.849076] ? _raw_read_unlock+0x2c/0x50 [ 1933.853232] ? __get_fs_type+0x97/0xc0 [ 1933.857138] do_mount+0x581/0x31f0 [ 1933.860725] ? retint_kernel+0x1b/0x2d [ 1933.864642] ? trace_hardirqs_on+0x310/0x310 [ 1933.869090] ? copy_mount_string+0x40/0x40 [ 1933.873354] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1933.878153] ? retint_kernel+0x2d/0x2d [ 1933.882065] ? copy_mount_options+0x1e3/0x430 [ 1933.886593] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1933.891475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1933.897045] ? copy_mount_options+0x315/0x430 [ 1933.901565] ksys_mount+0x12d/0x140 [ 1933.905220] __x64_sys_mount+0xbe/0x150 [ 1933.909210] do_syscall_64+0x1b9/0x820 [ 1933.913114] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1933.918508] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1933.923442] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1933.928300] ? trace_hardirqs_on_caller+0x310/0x310 [ 1933.933329] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1933.938390] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1933.943430] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1933.948292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1933.953501] RIP: 0033:0x457569 [ 1933.956716] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1933.975680] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:56:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xe0a}, 0x28) 03:56:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x92d}, 0x28) [ 1933.983573] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1933.990855] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1933.998136] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1934.005417] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1934.012710] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:56:07 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0xffffffffa0010000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:56:07 executing program 5 (fault-call:2 fault-nth:60): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:56:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x404}, 0x28) 03:56:07 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}]}, 0x80}}, 0x0) [ 1934.222661] FAULT_INJECTION: forcing a failure. [ 1934.222661] name failslab, interval 1, probability 0, space 0, times 0 [ 1934.238448] CPU: 1 PID: 13147 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1934.245403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1934.245415] Call Trace: [ 1934.257412] dump_stack+0x244/0x39d [ 1934.261066] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1934.266281] ? debug_smp_processor_id+0x1c/0x20 [ 1934.270966] ? perf_trace_lock+0x14d/0x7a0 [ 1934.270995] should_fail.cold.4+0xa/0x17 [ 1934.271019] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1934.271041] ? kasan_check_read+0x11/0x20 [ 1934.288633] ? do_raw_spin_unlock+0xa7/0x330 [ 1934.293326] ? zap_class+0x640/0x640 [ 1934.297066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1934.302629] ? find_held_lock+0x36/0x1c0 [ 1934.306713] ? __lock_is_held+0xb5/0x140 [ 1934.310819] ? perf_trace_sched_process_exec+0x860/0x860 [ 1934.316347] __should_failslab+0x124/0x180 [ 1934.320624] should_failslab+0x9/0x14 [ 1934.324435] __kmalloc+0x2d4/0x760 [ 1934.328000] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1934.333033] ? __kmalloc+0x5e4/0x760 [ 1934.336762] ? ovl_alloc_entry+0x24/0x70 [ 1934.340856] ovl_alloc_entry+0x24/0x70 [ 1934.344762] ovl_fill_super+0x29b1/0x3f7b [ 1934.348950] ? ovl_show_options+0x550/0x550 [ 1934.353278] ? __free_pages+0x100/0x190 [ 1934.357263] ? selinux_sb_copy_data+0x602/0x740 [ 1934.361958] ? selinux_capable+0x36/0x40 [ 1934.366038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1934.371596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1934.377148] ? get_anon_bdev+0xc0/0xc0 [ 1934.381042] ? sget+0x113/0x150 [ 1934.384333] ? ovl_show_options+0x550/0x550 [ 1934.388665] mount_nodev+0x6b/0x110 [ 1934.392307] ovl_mount+0x2c/0x40 [ 1934.395686] mount_fs+0xae/0x31d [ 1934.399073] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1934.403687] ? may_umount+0xb0/0xb0 [ 1934.407352] ? _raw_read_unlock+0x2c/0x50 [ 1934.411508] ? __get_fs_type+0x97/0xc0 [ 1934.415414] do_mount+0x581/0x31f0 [ 1934.418971] ? check_preemption_disabled+0x48/0x280 [ 1934.424017] ? copy_mount_string+0x40/0x40 [ 1934.428279] ? copy_mount_options+0x5f/0x430 [ 1934.432698] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1934.437723] ? kmem_cache_alloc_trace+0x353/0x750 [ 1934.442585] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1934.448133] ? _copy_from_user+0xdf/0x150 [ 1934.452301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1934.457864] ? copy_mount_options+0x315/0x430 [ 1934.462407] ksys_mount+0x12d/0x140 [ 1934.466049] __x64_sys_mount+0xbe/0x150 [ 1934.470038] do_syscall_64+0x1b9/0x820 [ 1934.473938] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1934.479324] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1934.484267] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1934.489129] ? trace_hardirqs_on_caller+0x310/0x310 [ 1934.494181] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1934.499213] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1934.504246] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1934.509110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1934.514309] RIP: 0033:0x457569 [ 1934.517512] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1934.536427] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1934.544149] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1934.551430] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1934.558714] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1934.565998] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 03:56:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x81b}, 0x28) 03:56:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xb60}, 0x28) 03:56:08 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x500000000000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1934.573281] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:56:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}}, 0x1c) close(r1) 03:56:08 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x34000]}}]}, 0x80}}, 0x0) 03:56:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x84a}, 0x28) 03:56:08 executing program 5 (fault-call:2 fault-nth:61): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:56:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xed2}, 0x28) [ 1934.745588] net_ratelimit: 3 callbacks suppressed [ 1934.745600] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:56:08 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x4000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1934.822113] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1934.835642] FAULT_INJECTION: forcing a failure. [ 1934.835642] name failslab, interval 1, probability 0, space 0, times 0 03:56:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}}, 0x1c) close(r1) [ 1934.905065] CPU: 0 PID: 13170 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1934.912060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1934.921426] Call Trace: [ 1934.924041] dump_stack+0x244/0x39d [ 1934.927694] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1934.932911] ? debug_smp_processor_id+0x1c/0x20 [ 1934.937597] ? perf_trace_lock+0x14d/0x7a0 [ 1934.941885] should_fail.cold.4+0xa/0x17 [ 1934.943780] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1934.945980] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1934.946003] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1934.946022] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1934.946044] ? trace_hardirqs_on+0xbd/0x310 [ 1934.946064] ? kasan_check_read+0x11/0x20 [ 1934.980654] ? ida_alloc_range+0x51e/0xad0 [ 1934.984920] ? zap_class+0x640/0x640 [ 1934.988656] ? save_stack+0x43/0xd0 [ 1934.992354] ? kasan_kmalloc+0xc7/0xe0 [ 1934.996267] ? kmem_cache_alloc+0x12e/0x730 [ 1935.000615] ? find_held_lock+0x36/0x1c0 [ 1935.004702] ? __lock_is_held+0xb5/0x140 [ 1935.008812] ? perf_trace_sched_process_exec+0x860/0x860 [ 1935.009247] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1935.014309] __should_failslab+0x124/0x180 [ 1935.014332] should_failslab+0x9/0x14 [ 1935.014369] __kmalloc_track_caller+0x2d0/0x750 [ 1935.014396] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1935.042447] ? kstrdup_const+0x66/0x80 [ 1935.046354] kstrdup+0x39/0x70 [ 1935.049948] kstrdup_const+0x66/0x80 03:56:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000]}}, 0x1c) close(r1) [ 1935.053683] alloc_vfsmnt+0x186/0x990 [ 1935.057506] ? m_stop+0x20/0x20 [ 1935.060798] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1935.066093] ? rcu_softirq_qs+0x20/0x20 [ 1935.070090] ? rcu_softirq_qs+0x20/0x20 [ 1935.074085] ? unwind_dump+0x190/0x190 [ 1935.078003] ? is_bpf_text_address+0xd3/0x170 [ 1935.081430] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1935.082516] ? kernel_text_address+0x79/0xf0 [ 1935.082535] ? __kernel_text_address+0xd/0x40 [ 1935.082553] ? unwind_get_return_address+0x61/0xa0 [ 1935.082594] ? __save_stack_trace+0x8d/0xf0 [ 1935.082629] ? save_stack+0xa9/0xd0 [ 1935.114743] ? save_stack+0x43/0xd0 [ 1935.118388] ? kasan_kmalloc+0xc7/0xe0 [ 1935.122294] ? __kmalloc+0x14e/0x760 [ 1935.126030] ? ovl_fill_super+0x240e/0x3f7b [ 1935.130408] clone_mnt+0x124/0x13b0 [ 1935.134059] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1935.139454] ? kern_mount_data+0xc0/0xc0 [ 1935.143569] ? zap_class+0x640/0x640 03:56:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5546ca0d]}}, 0x1c) close(r1) [ 1935.144146] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1935.147308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1935.147327] ? check_preemption_disabled+0x48/0x280 [ 1935.147357] ? __lock_is_held+0xb5/0x140 [ 1935.147394] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1935.177324] ? __kmalloc+0x5e4/0x760 [ 1935.181066] clone_private_mount+0xba/0x100 [ 1935.185413] ovl_fill_super+0x2731/0x3f7b [ 1935.189596] ? ovl_show_options+0x550/0x550 [ 1935.193932] ? __free_pages+0x100/0x190 [ 1935.197930] ? selinux_sb_copy_data+0x602/0x740 [ 1935.202638] ? selinux_capable+0x36/0x40 [ 1935.206720] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1935.212279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1935.217857] ? get_anon_bdev+0xc0/0xc0 [ 1935.221792] ? sget+0x113/0x150 [ 1935.225072] ? ovl_show_options+0x550/0x550 [ 1935.229405] mount_nodev+0x6b/0x110 [ 1935.233034] ovl_mount+0x2c/0x40 [ 1935.236397] mount_fs+0xae/0x31d [ 1935.239762] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1935.244364] ? may_umount+0xb0/0xb0 [ 1935.247999] ? _raw_read_unlock+0x2c/0x50 [ 1935.252176] ? __get_fs_type+0x97/0xc0 [ 1935.256063] do_mount+0x581/0x31f0 [ 1935.259600] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1935.265042] ? retint_kernel+0x1b/0x2d [ 1935.268932] ? copy_mount_string+0x40/0x40 [ 1935.273167] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1935.277935] ? retint_kernel+0x2d/0x2d [ 1935.281829] ? copy_mount_options+0x239/0x430 [ 1935.286342] ? copy_mount_options+0x249/0x430 [ 1935.290832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1935.296384] ? copy_mount_options+0x315/0x430 [ 1935.300915] ksys_mount+0x12d/0x140 [ 1935.304554] __x64_sys_mount+0xbe/0x150 [ 1935.308539] do_syscall_64+0x1b9/0x820 [ 1935.312441] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1935.317817] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1935.322764] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1935.327611] ? trace_hardirqs_on_caller+0x310/0x310 [ 1935.332644] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1935.337681] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1935.342707] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1935.347552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1935.352730] RIP: 0033:0x457569 [ 1935.355915] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1935.374822] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1935.382538] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1935.389798] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1935.397069] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 03:56:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x69d}, 0x28) 03:56:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x1067}, 0x28) [ 1935.404330] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1935.411599] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 [ 1935.432642] overlayfs: failed to clone lowerpath 03:56:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x14ac}, 0x28) 03:56:08 executing program 5 (fault-call:2 fault-nth:62): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:56:09 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}}]}, 0x80}}, 0x0) 03:56:09 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0xf000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:56:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x13b2}, 0x28) [ 1935.627771] FAULT_INJECTION: forcing a failure. [ 1935.627771] name failslab, interval 1, probability 0, space 0, times 0 [ 1935.640740] CPU: 0 PID: 13211 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1935.647688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1935.657042] Call Trace: [ 1935.659642] dump_stack+0x244/0x39d [ 1935.663283] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1935.668478] ? check_preemption_disabled+0x48/0x280 [ 1935.673515] should_fail.cold.4+0xa/0x17 [ 1935.677608] ? __lock_is_held+0xb5/0x140 [ 1935.681686] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1935.686806] ? __find_get_block+0x3be/0xf20 [ 1935.691135] ? zap_class+0x640/0x640 [ 1935.694894] ? __lock_is_held+0xb5/0x140 [ 1935.699007] ? __lock_is_held+0xb5/0x140 [ 1935.703093] ? perf_trace_sched_process_exec+0x860/0x860 [ 1935.708549] ? __getblk_gfp+0x11b/0xd50 [ 1935.712528] ? ext4_xattr_block_find.isra.20+0x720/0x720 [ 1935.717985] ? ovl_mount+0x2c/0x40 [ 1935.721530] ? mount_fs+0xae/0x31d [ 1935.725077] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 1935.729838] ? do_mount+0x581/0x31f0 [ 1935.733570] ? ksys_mount+0x12d/0x140 [ 1935.737388] __should_failslab+0x124/0x180 [ 1935.741658] should_failslab+0x9/0x14 [ 1935.745465] kmem_cache_alloc+0x2be/0x730 [ 1935.749636] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1935.755187] mb_cache_entry_create+0x143/0xb30 [ 1935.759785] ? mb_cache_shrink+0xae0/0xae0 [ 1935.764029] ? var_wake_function+0x150/0x150 [ 1935.768450] ? perf_trace_sched_process_exec+0x860/0x860 [ 1935.773916] ? ext4_should_retry_alloc+0x220/0x220 [ 1935.778890] ext4_xattr_block_set+0x1f3d/0x4490 [ 1935.783577] ? ext4_xattr_block_find.isra.20+0x720/0x720 [ 1935.789031] ? zap_class+0x640/0x640 [ 1935.792755] ? check_preemption_disabled+0x48/0x280 [ 1935.797788] ? ext4_xattr_ibody_set+0x2c0/0x2c0 [ 1935.802474] ? __lock_is_held+0xb5/0x140 [ 1935.806565] ? perf_trace_sched_process_exec+0x860/0x860 [ 1935.812045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1935.817591] ? ext4_xattr_check_entries+0x133/0x430 [ 1935.822622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1935.828166] ? xattr_find_entry+0x1e4/0x280 [ 1935.832505] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1935.838046] ? ext4_xattr_ibody_set+0x1ec/0x2c0 [ 1935.842730] ext4_xattr_set_handle+0xff4/0x1650 [ 1935.847421] ? ext4_xattr_ibody_inline_set+0x2c0/0x2c0 [ 1935.852711] ? __might_sleep+0x95/0x190 [ 1935.856694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1935.862254] ? ext4_journal_check_start+0x18e/0x220 [ 1935.867278] ? ext4_xattr_set+0x1f7/0x420 [ 1935.871437] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 1935.877173] ext4_xattr_set+0x248/0x420 [ 1935.881188] ? ext4_xattr_set_credits+0x120/0x120 [ 1935.886047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1935.891595] ? evm_protected_xattr+0x206/0x290 [ 1935.896189] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 1935.901215] ? ext4_xattr_destroy_cache+0x30/0x30 [ 1935.906062] ext4_xattr_trusted_set+0x36/0x40 [ 1935.910570] __vfs_setxattr+0x124/0x180 [ 1935.914556] ? xattr_resolve_name+0x430/0x430 [ 1935.919078] __vfs_setxattr_noperm+0x11d/0x410 [ 1935.923679] vfs_setxattr+0xd8/0x100 [ 1935.927410] ovl_verify_set_fh+0x166/0x180 [ 1935.931668] ovl_fill_super+0x3026/0x3f7b [ 1935.935860] ? ovl_show_options+0x550/0x550 [ 1935.940196] ? __free_pages+0x100/0x190 [ 1935.944181] ? selinux_sb_copy_data+0x602/0x740 [ 1935.948886] ? selinux_capable+0x36/0x40 [ 1935.952960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1935.958509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1935.964065] ? get_anon_bdev+0xc0/0xc0 [ 1935.968458] ? sget+0x113/0x150 [ 1935.971749] ? ovl_show_options+0x550/0x550 [ 1935.976078] mount_nodev+0x6b/0x110 [ 1935.979716] ovl_mount+0x2c/0x40 [ 1935.983093] mount_fs+0xae/0x31d [ 1935.986475] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1935.991072] ? may_umount+0xb0/0xb0 [ 1935.994706] ? _raw_read_unlock+0x2c/0x50 [ 1935.998871] ? __get_fs_type+0x97/0xc0 [ 1936.002782] do_mount+0x581/0x31f0 [ 1936.006329] ? check_preemption_disabled+0x48/0x280 [ 1936.011366] ? copy_mount_string+0x40/0x40 [ 1936.015626] ? copy_mount_options+0x5f/0x430 [ 1936.020044] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1936.025066] ? kmem_cache_alloc_trace+0x353/0x750 [ 1936.029925] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1936.035472] ? _copy_from_user+0xdf/0x150 [ 1936.039636] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1936.045179] ? copy_mount_options+0x315/0x430 [ 1936.049691] ksys_mount+0x12d/0x140 [ 1936.053329] __x64_sys_mount+0xbe/0x150 [ 1936.057315] do_syscall_64+0x1b9/0x820 [ 1936.061215] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1936.066610] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1936.071549] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1936.076568] ? trace_hardirqs_on_caller+0x310/0x310 [ 1936.081614] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1936.086641] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1936.091684] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1936.096569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1936.101760] RIP: 0033:0x457569 [ 1936.104959] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:56:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xa61}, 0x28) 03:56:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}, 0x1c) close(r1) [ 1936.123897] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1936.131627] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1936.138900] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1936.146175] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1936.153446] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1936.160720] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 03:56:09 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0xff3f000000000000]}}]}, 0x80}}, 0x0) 03:56:09 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0xf00000000000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:56:09 executing program 5 (fault-call:2 fault-nth:63): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:56:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x90e}, 0x28) [ 1936.261901] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:56:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x10c7}, 0x28) 03:56:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c1d]}}, 0x1c) close(r1) [ 1936.450313] FAULT_INJECTION: forcing a failure. [ 1936.450313] name failslab, interval 1, probability 0, space 0, times 0 [ 1936.478209] CPU: 0 PID: 13242 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1936.485169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1936.494530] Call Trace: 03:56:10 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x400000000000000]}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) [ 1936.494589] dump_stack+0x244/0x39d [ 1936.494617] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1936.494639] ? debug_smp_processor_id+0x1c/0x20 [ 1936.494659] ? perf_trace_lock+0x14d/0x7a0 [ 1936.494700] should_fail.cold.4+0xa/0x17 [ 1936.494739] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1936.494774] ? save_stack+0x43/0xd0 [ 1936.506189] ? kasan_kmalloc+0xc7/0xe0 [ 1936.506205] ? kmem_cache_alloc_trace+0x152/0x750 [ 1936.506270] ? ovl_encode_real_fh+0xca/0x500 [ 1936.506289] ? zap_class+0x640/0x640 [ 1936.544790] ? ovl_mount+0x2c/0x40 03:56:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0x13de}, 0x28) [ 1936.548349] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 1936.553117] ? do_mount+0x581/0x31f0 [ 1936.556862] ? ksys_mount+0x12d/0x140 [ 1936.560694] ? __x64_sys_mount+0xbe/0x150 [ 1936.564869] ? do_syscall_64+0x1b9/0x820 [ 1936.568966] ? find_held_lock+0x36/0x1c0 [ 1936.573052] ? __lock_is_held+0xb5/0x140 [ 1936.577155] ? perf_trace_sched_process_exec+0x860/0x860 [ 1936.582685] __should_failslab+0x124/0x180 [ 1936.586942] should_failslab+0x9/0x14 [ 1936.590764] __kmalloc+0x2d4/0x760 [ 1936.594326] ? dput+0x15/0x20 [ 1936.597443] ? ovl_encode_real_fh+0x1bb/0x500 [ 1936.601954] ovl_encode_real_fh+0x1bb/0x500 [ 1936.606288] ? ovl_set_attr+0x550/0x550 [ 1936.610274] ? may_umount_tree+0x210/0x210 [ 1936.614516] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1936.619555] ovl_verify_set_fh+0x36/0x180 [ 1936.623729] ovl_fill_super+0x3026/0x3f7b [ 1936.627926] ? ovl_show_options+0x550/0x550 [ 1936.632260] ? __free_pages+0x100/0x190 [ 1936.636243] ? selinux_sb_copy_data+0x602/0x740 [ 1936.640936] ? selinux_capable+0x36/0x40 [ 1936.645005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1936.650552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1936.656105] ? get_anon_bdev+0xc0/0xc0 [ 1936.660011] ? sget+0x113/0x150 [ 1936.663302] ? ovl_show_options+0x550/0x550 [ 1936.667633] mount_nodev+0x6b/0x110 [ 1936.671271] ovl_mount+0x2c/0x40 [ 1936.674647] mount_fs+0xae/0x31d [ 1936.678031] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1936.682626] ? may_umount+0xb0/0xb0 [ 1936.686260] ? _raw_read_unlock+0x2c/0x50 [ 1936.690419] ? __get_fs_type+0x97/0xc0 [ 1936.694321] do_mount+0x581/0x31f0 [ 1936.697899] ? check_preemption_disabled+0x48/0x280 [ 1936.702952] ? copy_mount_string+0x40/0x40 [ 1936.707209] ? copy_mount_options+0x5f/0x430 [ 1936.711623] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1936.716646] ? kmem_cache_alloc_trace+0x353/0x750 [ 1936.721498] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1936.727040] ? _copy_from_user+0xdf/0x150 [ 1936.731198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1936.736743] ? copy_mount_options+0x315/0x430 [ 1936.741252] ksys_mount+0x12d/0x140 [ 1936.744927] __x64_sys_mount+0xbe/0x150 [ 1936.748918] do_syscall_64+0x1b9/0x820 [ 1936.752817] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1936.758199] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1936.763137] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1936.767986] ? trace_hardirqs_on_caller+0x310/0x310 [ 1936.773009] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1936.778054] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1936.783087] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1936.787951] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1936.793144] RIP: 0033:0x457569 [ 1936.796343] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1936.815263] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1936.822982] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1936.830263] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1936.837552] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1936.844825] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 03:56:10 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1, [0x0, 0x0, 0x0, 0x0, 0x20000000]}}]}, 0x80}}, 0x0) 03:56:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000010000002800000c09af6d70000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0xfc, &(0x7f00000002c0)="bad8181b00000000000000000000", &(0x7f0000000580)=""/252, 0xd95}, 0x28) [ 1936.852139] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 [ 1936.865501] overlayfs: failed to verify origin (5086/file0, ino=16738, err=-12) [ 1936.883750] ------------[ cut here ]------------ [ 1936.888537] kernel BUG at arch/x86/mm/physaddr.c:22! [ 1936.893664] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1936.899042] CPU: 1 PID: 13242 Comm: syz-executor5 Not tainted 4.19.0+ #79 [ 1936.905976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1936.915417] RIP: 0010:__phys_addr+0xff/0x120 [ 1936.919833] Code: 3c 02 00 75 31 4c 8b 25 4f 3b ee 07 48 89 de bf ff ff ff 1f e8 82 9b 46 00 49 01 dc 48 81 fb ff ff ff 1f 76 a7 e8 41 9a 46 00 <0f> 0b e8 6a 98 8a 00 e9 7a ff ff ff e8 c0 98 8a 00 eb c8 0f 1f 40 [ 1936.938755] RSP: 0018:ffff880184697770 EFLAGS: 00010046 [ 1936.944121] RAX: 0000000000040000 RBX: 000000007ffffff4 RCX: ffffc9000bf30000 [ 1936.951417] RDX: 0000000000040000 RSI: ffffffff8138e4df RDI: 0000000000000007 [ 1936.958690] RBP: ffff880184697788 R08: ffff8801b903a700 R09: ffffed003b5e5b57 [ 1936.965958] R10: ffffed003b5e5b57 R11: ffff8801daf2dabb R12: 000000007ffffff4 [ 1936.973533] R13: 0000000000000001 R14: ffffffff882f9080 R15: 0000000000004162 [ 1936.980805] FS: 00007ff2bf88f700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 1936.989028] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1936.994907] CR2: 00007f7841144518 CR3: 00000001c7aae000 CR4: 00000000001406e0 [ 1937.002181] Call Trace: [ 1937.004788] ? ovl_verify_set_fh+0xba/0x180 [ 1937.009116] kfree+0x7b/0x230 [ 1937.012232] ovl_verify_set_fh+0xba/0x180 [ 1937.016393] ovl_fill_super+0x3026/0x3f7b [ 1937.020567] ? ovl_show_options+0x550/0x550 [ 1937.024907] ? __free_pages+0x100/0x190 [ 1937.028935] ? selinux_sb_copy_data+0x602/0x740 [ 1937.033618] ? selinux_capable+0x36/0x40 [ 1937.037691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1937.043251] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1937.048806] ? get_anon_bdev+0xc0/0xc0 [ 1937.052720] ? sget+0x113/0x150 [ 1937.056006] ? ovl_show_options+0x550/0x550 [ 1937.060336] mount_nodev+0x6b/0x110 [ 1937.063969] ovl_mount+0x2c/0x40 [ 1937.067340] mount_fs+0xae/0x31d [ 1937.070736] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1937.075412] ? may_umount+0xb0/0xb0 [ 1937.079044] ? _raw_read_unlock+0x2c/0x50 [ 1937.083195] ? __get_fs_type+0x97/0xc0 [ 1937.087095] do_mount+0x581/0x31f0 [ 1937.090643] ? check_preemption_disabled+0x48/0x280 [ 1937.095669] ? copy_mount_string+0x40/0x40 [ 1937.099919] ? copy_mount_options+0x5f/0x430 [ 1937.104332] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1937.109351] ? kmem_cache_alloc_trace+0x353/0x750 [ 1937.114200] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1937.119759] ? _copy_from_user+0xdf/0x150 [ 1937.123917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1937.129456] ? copy_mount_options+0x315/0x430 [ 1937.133963] ksys_mount+0x12d/0x140 [ 1937.137599] __x64_sys_mount+0xbe/0x150 [ 1937.141581] do_syscall_64+0x1b9/0x820 [ 1937.145478] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1937.150863] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1937.155794] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1937.160646] ? trace_hardirqs_on_caller+0x310/0x310 [ 1937.165675] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1937.170700] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1937.175728] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1937.180592] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1937.185789] RIP: 0033:0x457569 [ 1937.188982] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1937.207882] RSP: 002b:00007ff2bf88ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1937.215617] RAX: ffffffffffffffda RBX: 00007ff2bf88ec90 RCX: 0000000000457569 [ 1937.222888] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1937.230160] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 1937.237428] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2bf88f6d4 [ 1937.244699] R13: 00000000004c2916 R14: 00000000004d3d68 R15: 0000000000000003 [ 1937.251981] Modules linked in: [ 1937.255193] ---[ end trace df8e9ac9a8931496 ]--- [ 1937.259959] RIP: 0010:__phys_addr+0xff/0x120 [ 1937.264391] Code: 3c 02 00 75 31 4c 8b 25 4f 3b ee 07 48 89 de bf ff ff ff 1f e8 82 9b 46 00 49 01 dc 48 81 fb ff ff ff 1f 76 a7 e8 41 9a 46 00 <0f> 0b e8 6a 98 8a 00 e9 7a ff ff ff e8 c0 98 8a 00 eb c8 0f 1f 40 [ 1937.283295] RSP: 0018:ffff880184697770 EFLAGS: 00010046 [ 1937.288659] RAX: 0000000000040000 RBX: 000000007ffffff4 RCX: ffffc9000bf30000 [ 1937.295934] RDX: 0000000000040000 RSI: ffffffff8138e4df RDI: 0000000000000007 [ 1937.303208] RBP: ffff880184697788 R08: ffff8801b903a700 R09: ffffed003b5e5b57 [ 1937.310481] R10: ffffed003b5e5b57 R11: ffff8801daf2dabb R12: 000000007ffffff4 [ 1937.317746] R13: 0000000000000001 R14: ffffffff882f9080 R15: 0000000000004162 [ 1937.325017] FS: 00007ff2bf88f700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 1937.333240] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1937.339119] CR2: 00007f7841144518 CR3: 00000001c7aae000 CR4: 00000000001406e0 [ 1937.346394] Kernel panic - not syncing: Fatal exception [ 1937.352759] Kernel Offset: disabled [ 1937.356389] Rebooting in 86400 seconds..